Page cover

Internal Discovery

Net User

C:>net user

Administrator eLS Guest HelpAssistant jessica kirk mrjohn netadmin SUPPORT_388945a0

C:>Net Accounts Force user logoff how long after time expires?: Never Minimum password age (days): 3 Maximum password age (days): 32 Minimum password length: 4 Length of password history maintained: None Lockout threshold: 3 Lockout duration (minutes): 11 Lockout observation window (minutes): 8 Computer role: WORKSTATION The command completed successfully.

IPTables

#iptables -vn -L //verbose, numeric output, list the tables #iptables -A OUTPUT -d 10.10.10.14 -j DROP //Append to output table, the outbound traffic towards 10.10.10.14 should be dropped

Set up an iptable link to track bytes from a scan.

iptables -I INPUT 1 -s <ip> -j ACCEPT

iptables -I OUTPUT 1 -d <ip> -j ACCEPT

iptables -Z

Then Scan

nmap -sT <ip> syn scan for top 1000 ports makes 72KB of traffic

Then check the bytes size #iptables -vn -L We can clear the logging for another scan

iptables -Z //zero packet counter

We then do a full range port scan

nmap -sT -p 1-65535 <ip> scan makes 4.5MB of traffic but may produce more ports also

//So a full port scan of a /24 network will result in 1000MB of traffic

//launch the script then launch something like an nmap scan to see how much traffic it generated #! /bin/bash

//reset all counters and iptable rules

iptables -Z && iptables -F

//measure incoming traffic to ip

iptables -I INPUT 1 -S -j ACCEPT

//measure outgoing traffic to ip

iptables -I OUTPUT 1 -d -j ACCEPT

//chmod 755 it //

Last updated

Was this helpful?