Documents

Trabalho Paulo Licio - tarefa 2

Description
Trabalho Paulo Licio
Categories
Published
of 18
All materials on our website are shared by users. If you have any questions about copyright issues, please report us to resolve them. We are always happy to assist you.
Related Documents
Share
Transcript
  UNIVERSIDADE ESTADUAL DE CAMPINASINSTITUTO DE COMPUTAÇÃOEspecialização em Redes de Comp!ado esIN#$%&' ( )ESTÃO DA SE)URANÇA DE REDES DE COMPUTADORES I Ta e*a +Ma ia,a Lz )-esI a, .eze a do Nascime,!oCAMPINAS ( SP&/+0  SUMÁRIO 1.INTRODUÇÃO....................................................................................................................32.Pratica.................................................................................................................................4 &1+1I,s!ala Uma #e ame,!a 2e Pe mi!a A I,3eção De Paco!es 45pi,67 T%/8 Na M9:i,a ATACANTE45os!81111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111110&1&1I,s!ala Um Se ;ido <e= Na M9:i,a ALVO11111111111111111111111111111111111111111111111111111111111111111111111111111111111111110&1>1Ve i*ica O Tempo Do Do?,load Do I,de@15!ml Desse Se ;ido <e= A Pa !i Da M9:i,a USURIO7  Cap! a,do Paco!es De Rede1111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111B&101Ve i*ica O S!a!s Da M9:i,a ALVO11111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111&1%1Tes!a A #e ame,!a De I,3eção De Paco!es Co,! a A M9:i,a ALVO A Pa !i Da M9:i,a ATACANTE111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111'&1B1Ve i*ica A Si!ação Da M9:i,a ALVO D a,!e O A!a:e1111111111111111111111111111111111111111111111111111111111111111111++&112es!es1111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111+>&1'1a=ili!a SFN CooGies Na M9:i,a ALVO11111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111+0&1H1Repe!i Os Passos > A! B1111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111+0&1+/1Resl!ados O=se ;ados111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111+' &  1.INTRODUÇÃO Nes!e la=o a!- io a,alisa emos a al!e ação de ! a*e6o !iliza,do o ,ão o SJ,CooGies1Como am=ie,!e *o am !ilizadas as m9:i,as c iadas em m am=ie,!e ;i !alse,do ide,!i*icado a=ai@o o :e cada ma se ia ,o e@pe ime,!oKSP ( como s9 io1MS ( como a!aca,!e1M6 ( como al;o1>  2.PRATICA Todas as m9:i,as i,iciam po pad ão com o sJ,cooGies desa=ili!ado1Ro!ei oK 2.1.Instalar Uma Frramnta !  Prmita A In#$%& D Pac&ts '()in*+ T,- Na M/0 ina ATACANT '(&st  ms@ms:~$ sudo apt-get install hping3Reading package lists... DoneBuilding dependency treeReading state information... Donehping3 is already the newest ersion.! upgraded ! newly installed ! to remoe and #3 not upgraded. 2.2.Instalar Um Sri&r 5 Na M/0 ina A67O.  mg@mg:~$ sudo apt-get update%sudo& password for mg:'gn http:((us.archie.u)untu.com trusty 'nRelease'gn http:((security.u)untu.com trusty-security 'nRelease'gn http:((us.archie.u)untu.com trusty-updates 'nRelease*et:# http:((security.u)untu.com trusty-security Release.gpg %+33 B&'gn http:((us.archie.u)untu.com trusty-)ackports 'nRelease*et:, http:((us.archie.u)untu.com trusty Release.gpg %+33 B&*et:3 http:((us.archie.u)untu.com trusty-updates Release.gpg %+33 B&*et: http:((us.archie.u)untu.com trusty-)ackports Release.gpg %+33 B&*et: http:((security.u)untu.com trusty-security Release %+. kB&*et:/ http:((us.archie.u)untu.com trusty Release %0. kB&*et: http:((us.archie.u)untu.com trusty-updates Release %+. kB&*et:0 http:((us.archie.u)untu.com trusty-)ackports Release %+. kB&*et:+ http:((security.u)untu.com trusty-security(main 1ources %.3 kB&*et:#! http:((us.archie.u)untu.com trusty(main 1ources %# !/ kB&*et:## http:((security.u)untu.com trusty-security(restricted 1ources %# B&*et:#, http:((security.u)untu.com trusty-security(unierse 1ources %#!.0 kB&*et:#3 http:((security.u)untu.com trusty-security(multierse 1ources %!! B&*et:# http:((security.u)untu.com trusty-security(main i30/ 2ackages %#33 kB&*et:# http:((us.archie.u)untu.com trusty(restricted 1ources % 33 B&*et:#/ http:((us.archie.u)untu.com trusty(unierse 1ources %/ 3++ kB&*et:# http:((security.u)untu.com trusty-security(restricted i30/ 2ackages %# B&*et:#0 http:((security.u)untu.com trusty-security(unierse i30/ 2ackages %.! kB&*et:#+ http:((security.u)untu.com trusty-security(multierse i30/ 2ackages %# 3+0 B& 0
We Need Your Support
Thank you for visiting our website and your interest in our free products and services. We are nonprofit website to share and download documents. To the running of this website, we need your help to support us.

Thanks to everyone for your continued support.

No, Thanks