设为首页收藏本站language 语言切换
查看: 2740|回复: 8
收起左侧

[LAB战报] 关于DIAG3的详细情况

[复制链接]
发表于 2016-11-24 01:15:23 | 显示全部楼层 |阅读模式
    各位,如果有对DIAG3感兴趣的请加我QQ2897152692,我这有点详细情况,想帮助一下野战军兄弟。
+ V9 b% I9 P$ J! H
发表于 2016-11-24 09:36:58 | 显示全部楼层
想(shou)帮(fei)一(mai)下(zi)兄(liao)弟
沙发 2016-11-24 09:36:58 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2016-11-24 10:44:12 | 显示全部楼层
没资料分享一下吗?
板凳 2016-11-24 10:44:12 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2016-11-24 13:07:17 | 显示全部楼层
Question 1  
' T3 R0 q+ J( R' M; r: p+ Z(Shows a PCAP)) t0 r% R+ m6 v9 d0 z0 I8 N
Whats happening in the network?(chose 4)) x4 F9 n# I7 z$ u7 I
a. tcp session from A to B, L2 ^# T6 b. z- W+ Y- L; X+ _" T
b. tcp session from B to A———————————3
  k; ^/ Q, m3 c; V" F, z6 lc. http session from A to B———————————1% y! l- N- F3 U# G
d. http session from B to A
) S( D* c! X2 T5 w, v, d& d3 Te. ransomware installed by backdoor———————————45 o7 E. U3 U( R( o6 O1 A
f. backdoor installed by ransomware
1 m- _6 y$ M1 U8 F: m5 dg. tcl script downloaded from A2 q6 e: b0 |5 k; p+ k2 a) e2 ~& s
h. tcl script downloaded from B———————————2
: S6 r. I: `4 A: ]————
# \4 d9 J% ]+ \0 F' P% YAnswers
4 L% X6 n; z& e1. HTTP session from A to B
8 T* F% [& h/ a' Y3 n2. TCL script download from A
( m' x/ Y. O* ~$ X, y. m4 h; H$ J3. TCP session from B to A3 [, F  k# U: A2 {. z8 X+ x
4. ransomware installed by backdoor" y, D( @: M% e
1 j  ~0 e' P* Y7 o9 M
For Understanding.
2 \- j; q5 n, q5 Y8 j1 X1. HTTP session from A to B (A clicks a link that it shouldn't and goes to B's fishing website.)
4 U+ Q/ w3 }! M2. TCL script downloaded from B (A is the one running 'get' command, and downloads tcl from :cool:" t9 N2 d& Y2 u/ Q7 ~
3. TCP session from B to A (After A runs tcl, it creates a backdoor port on itself and B connects to A using this newly created backdoor.)# y( H+ }$ u5 I  ]) e0 d! I
4. ransomware installed by backdoor (B installs a ransomware to A using backdoor previously created)
0 t. a1 `4 @3 N* e% B7 O1 l7 q7 `" G* K+ a/ ?( l4 o0 P+ E- x
-========
3 K+ Y- G, _6 B: F% ^( J, X" HQuestion 2
9 b' K/ b, ^7 H& p0 B5 zWhich command use to execute the attack?
( T8 j) l# P1 i' P  Ya. sherkfest& o9 E$ }4 R4 m$ Y( r5 y8 O2 ?
b. sudo poweroff9 o" X/ s' y3 }
c.  tclsh:/ copy flash via http" s  T( H# Z! R0 q  I4 ~

  t, e1 H6 }0 E. kQuestion 3/ i+ d6 Z7 H( Y* M
Which command if issued from the hacker end can bring down the complete system?  z. A/ T! N1 Z: x3 e2 M
a. sudo poweroff
, F- V, W( f) T/ }* A. k3 J0 p6 d" ]% K$ m6 q" ^& X
Question 4
7 \8 t$ ]: i8 y2 JHow to quickly fix this problem?
8 r* G3 v" P) ^a. e kill,  kill the process.

评分

参与人数 3好评度 +3 收起 理由
lihuijun_2010 + 1 很给力!
junyi_de + 1 赞一个!
熊星宇 + 1 很给力!

查看全部评分

地板 2016-11-24 13:07:17 回复 收起回复
回复 支持 3 反对 0

使用道具 举报

发表于 2016-11-24 13:41:06 | 显示全部楼层
是不是还有一题?
5# 2016-11-24 13:41:06 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2016-12-24 11:08:26 | 显示全部楼层
ip need in, thank you
6# 2016-12-24 11:08:26 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2016-12-24 11:08:31 | 显示全部楼层
ip need in, thank you
7# 2016-12-24 11:08:31 回复 收起回复
回复 支持 反对

使用道具 举报

您需要登录后才可以回帖 登录 | 论坛注册

本版积分规则

QQ|Archiver|手机版|小黑屋|sitemap|鸿鹄论坛 ( 京ICP备14027439号 )  

GMT+8, 2025-5-9 14:11 , Processed in 0.120669 second(s), 25 queries , Redis On.  

  Powered by Discuz!

  © 2001-2025 HH010.COM

快速回复 返回顶部 返回列表