PaloAlto | Data Protection Profile
46. Data Protection Profile
Topologi
Step-1
Network | Zone Protection (Zone_Protection_Profile)
Lalu (Zone INSIDE) adalah psosisi Kali-Linux. Klik Menu Network | Zone (Zone Inside) Pilih Profile Zone_Protection_Profile yg sdh dibuat diatas tadi.
Lalu dari Zone Inside (Kali-Linux) Tes command ini:
TCP SYN (Flood) Attack:
root@kali:~#hping3 -c 15000 -d 120 -S -w 64 -p 443 --flood --rand-source 172.16.10.10
-------------------------------------------------------------------
TCP Port SCAN
root@kali:~# nmap -p1-65535 -T4 -A -v 172.16.10.10
-------------------------------------------------------------
Host Sweep
root@kali:~# nmap -sP 172.16.10.0/24
root@kali:~# nmap -p1-65535 -T4 -A -v 172.16.10.10
-------------------------------------------------------------
Host Sweep
root@kali:~# nmap -sP 172.16.10.0/24
-------------------------------------------------------------
UDP Port Scan:root@kali:~# nmap -sU -p0-65535 172.16.10.10
root@kali:~# nmap -sU 172.16.10.10
----------------------------------------------------------------
Monitor Hasilanya
BISA DENGAN CARA YANG KEDUA-2
Skenario-2
Device | Setup | Session
Device | Setup | Session
Lalu, Aktifkan di Zone Packet Buffer
DARI KALI LINUX, CB TEST
TCP SYN (Flood) Attack:
root@kali:~# hping3 -c 15000 -d 120 -S -w 64 -p 80 --flood --rand-source 172.16.10.10
root@kali:~#ping 172.16.10.10
root@kali:~# hping3 -1 --flood -a 172.16.10.10 172.16.10.255
============BEBERAP COMMAND I KALI-LINUX============
TCP SYN (Flood) Attack:
root@kali:~# hping3 -c 15000 -d 120 -S -w 64 -p 80 --flood --rand-source 192.168.17.150
root@kali:~# hping3 -c 15000 -d 120 -S -w 64 -p 443 --flood --rand-source 192.168.17.150
-------------------------------------------------------------------------------
ICMP Flooding Attack:
root@kali:~# hping3 -1 --flood -a 192.168.17.150 192.168.17.255
--------------------------------------------------------------------------------
UDP Port Scan:
root@kali:~# nmap -sU -p0-65535 192.168.17.150
root@kali:~# nmap -sU 192.168.17.150
--------------------------------------------------------------------------------
Host Sweep Attack:
root@kali:~# nmap -sP 192.168.17.150
-----------------------------------------------------------------------------
TCP Flood Attack:
root@kali:~# hping3 -S -P -U --flood -V --rand-source 192.168.17.150
------------------------------------------------------------------------
TCP Flood Attack DOS Protection Profile:
root@kali:~# hping3 -c 15000 -d 120 -S -w 64 -p 80 --flood --rand-source 192.168.17.150
-------------------------------------------------------------------
root@kali:~# hping3 -c 15000 -d 120 -S -w 64 -p 80 --flood --rand-source 192.168.17.150
root@kali:~# hping3 -c 15000 -d 120 -S -w 64 -p 443 --flood --rand-source 192.168.17.150
-------------------------------------------------------------------------------
ICMP Flooding Attack:
root@kali:~# hping3 -1 --flood -a 192.168.17.150 192.168.17.255
--------------------------------------------------------------------------------
UDP Port Scan:
root@kali:~# nmap -sU -p0-65535 192.168.17.150
root@kali:~# nmap -sU 192.168.17.150
--------------------------------------------------------------------------------
Host Sweep Attack:
root@kali:~# nmap -sP 192.168.17.150
-----------------------------------------------------------------------------
TCP Flood Attack:
root@kali:~# hping3 -S -P -U --flood -V --rand-source 192.168.17.150
------------------------------------------------------------------------
TCP Flood Attack DOS Protection Profile:
root@kali:~# hping3 -c 15000 -d 120 -S -w 64 -p 80 --flood --rand-source 192.168.17.150
-------------------------------------------------------------------
TCP Port SCAN
root@kali:~# nmap -p1-65535 -T4 -A -v 192.168.17.150
-------------------------------------------------------------
Host Sweep
root@kali:~# nmap -sP 192.168.17.0/24
root@kali:~# nmap -p1-65535 -T4 -A -v 192.168.17.150
-------------------------------------------------------------
Host Sweep
root@kali:~# nmap -sP 192.168.17.0/24
-------------------------------------------------------------
root@kali:~#ping 192.168.17.150 -s 125
---------------------
palo alto
root@kali:~#ping 192.168.17.150 -s 125
---------------------
palo alto
Posting Komentar untuk "PaloAlto | Data Protection Profile"