Lompat ke konten Lompat ke sidebar Lompat ke footer

PaloAlto | Data Protection Profile

 46. Data Protection Profile
Topologi



























Step-1

Network | Zone Protection (Zone_Protection_Profile)




























Lalu (Zone INSIDE) adalah psosisi Kali-Linux. Klik Menu
Network | Zone (Zone Inside) Pilih Profile Zone_Protection_Profile yg sdh dibuat diatas tadi.



















Lalu dari Zone Inside (Kali-Linux) Tes command ini:

TCP SYN (Flood) Attack:

root@kali:~#hping3 -c 15000 -d 120 -S -w 64 -p 443 --flood --rand-source 172.16.10.10
-------------------------------------------------------------------
TCP Port SCAN
root@kali:~# nmap -p1-65535 -T4 -A -v
172.16.10.10
-------------------------------------------------------------
Host Sweep
root@kali:~# nmap -sP 
172.16.10.0/24
-------------------------------------------------------------
UDP Port Scan:
root@kali:~# nmap -sU -p0-65535
172.16.10.10
root@kali:~# nmap -sU 172.16.10.10
----------------------------------------------------------------
Monitor Hasilanya
















BISA DENGAN CARA YANG KEDUA-2
Skenario-2
Device | Setup | Session
































Lalu, Aktifkan di Zone Packet Buffer

























DARI KALI LINUX, CB TEST
TCP SYN (Flood) Attack:
root@kali:~# hping3 -c 15000 -d 120 -S -w 64 -p 80 --flood --rand-source 172.16.10.10

root@kali:~#ping 172.16.10.10
root@kali:~# hping3 -1 --flood -a  172.16.10.10 172.16.10.255

 ============BEBERAP COMMAND I KALI-LINUX============
TCP SYN (Flood) Attack:
root@kali:~# hping3 -c 15000 -d 120 -S -w 64 -p 80 --flood --rand-source 192.168.17.150

root@kali:~# hping3 -c 15000 -d 120 -S -w 64 -p 443 --flood --rand-source 192.168.17.150
-------------------------------------------------------------------------------
ICMP Flooding Attack:
root@kali:~# hping3 -1 --flood -a  192.168.17.150 192.168.17.255
--------------------------------------------------------------------------------
UDP Port Scan:
root@kali:~# nmap -sU -p0-65535 192.168.17.150
root@kali:~# nmap -sU 192.168.17.150
--------------------------------------------------------------------------------
Host Sweep Attack:
root@kali:~# nmap -sP 192.168.17.150
-----------------------------------------------------------------------------
TCP Flood Attack:
root@kali:~# hping3 -S -P -U --flood -V --rand-source 192.168.17.150
------------------------------------------------------------------------
TCP Flood Attack DOS Protection Profile:
root@kali:~# hping3 -c 15000 -d 120 -S -w 64 -p 80 --flood --rand-source 192.168.17.150
-------------------------------------------------------------------

TCP Port SCAN
root@kali:~# nmap -p1-65535 -T4 -A -v 192.168.17.150
-------------------------------------------------------------
Host Sweep
root@kali:~# nmap -sP 192.168.17.0/24
-------------------------------------------------------------
root@kali:~#ping 192.168.17.150 -s 125
---------------------
palo alto

Posting Komentar untuk "PaloAlto | Data Protection Profile"