Enumerating User

First of all, we need activate the virtual machine(kali linux). After that, we should search tools in kali linux which is theharvest.

In command line, we should type this:

This is for getting the information from pentest.id such as Ip address and DNS record. Like this:

And also, we can check dnsdumpster.com to confirm the DNS record we got from theharvester.

After that, we are using the another tool which is WPScan to emurate the users. In command line we should type this:

It would appear like this and we found the users which is binusmaya:

 

Posted in Uncategorized | Leave a comment

TCP dump

First of all, we need two virtual machine to do the sniffing which are the first virtual machine as the attacker and the second virtual machine target. There are the step to sniffing :

1. We need to know both IP address which type ifconfig in command line

2. After that, type tcpdump –vvn –i eth0 host 192.168.0.12 –w andi.pcap and it will appear like this

3. Go to second virtual machine to open the website until we got the traffic

 

 

 

 

 

 

 

4. Go to folder, it will find the andi.pcap folder and open it

5. Finally, it will appear like this, The protocol it should be ARP

Posted in Uncategorized | Leave a comment

Hello world!

Welcome to Binusian blog.
This is the first post of any blog.binusian.org member blog. Edit or delete it, then start blogging!
Happy Blogging 🙂

Posted in Uncategorized | 1 Comment