Добавил:
Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
Отчет по лабораторной №4 ИСиУ.docx
Скачиваний:
5
Добавлен:
03.10.2022
Размер:
1.12 Mб
Скачать

0X0000: 0019 dbaf 9333 d027 88cf e290 0800 4510 .....3.'......E.

    0x0010:  0036 4893 4000 4006 d190 ac10 6415 ac10  .6H.@.@.....d...

    0x0020:  6458 a4fe 0017 9901 0fb9 de57 eaf1 8018  dX.........W....

    0x0030:  00ed de95 0000 0101 080a 42a0 aab8 8e8c  ..........B.....

    0x0040:  d6a2 0d00                            ....

18:29:08.166617 IP (tos 0x0, ttl 64, id 8009, offset 0, flags [DF], proto TCP (6), length 52)

172.16.100.88.23 > 172.16.100.21.42238: Flags [F.], cksum 0xd9e3 (correct), seq 7, ack 8, win 91, options [nop,nop,TS val 2391599341 ecr 1117825720], length 0

0X0000: d027 88cf e290 0019 dbaf 9333 0800 4500 .'.........3..E.

    0x0010:  0034 1f49 4000 4006 faec ac10 6458 ac10  .4.I@.@.....dX..

    0x0020:  6415 0017 a4fe de57 eaf1 9901 0fbb 8011  d......W........

    0x0030:  005b d9e3 0000 0101 080a 8e8c e8ed 42a0  .[............B.

    0x0040:  aab8                                 ..

18:29:08.166712 IP (tos 0x10, ttl 64, id 18580, offset 0, flags [DF], proto TCP (6), length 52)

172.16.100.21.42238 > 172.16.100.88.23: Flags [F.], cksum 0xd94e (correct), seq 8, ack 8, win 237, options [nop,nop,TS val 1117825722 ecr 2391599341], length 0

0X0000: 0019 dbaf 9333 d027 88cf e290 0800 4510 .....3.'......E.

    0x0010:  0034 4894 4000 4006 d191 ac10 6415 ac10  .4H.@.@.....d...

    0x0020:  6458 a4fe 0017 9901 0fbb de57 eaf2 8011  dX.........W....

    0x0030:  00ed d94e 0000 0101 080a 42a0 aaba 8e8c  ...N......B.....

    0x0040:  e8ed                                 ..

18:29:08.166953 IP (tos 0x0, ttl 64, id 8010, offset 0, flags [DF], proto TCP (6), length 52)

172.16.100.88.23 > 172.16.100.21.42238: Flags [.], cksum 0xd9e0 (correct), ack 9, win 91, options [nop,nop,TS val 2391599341 ecr 1117825722], length 0

0X0000: d027 88cf e290 0019 dbaf 9333 0800 4500 .'.........3..E.

    0x0010:  0034 1f4a 4000 4006 faeb ac10 6458 ac10  .4.J@.@.....dX..

    0x0020:  6415 0017 a4fe de57 eaf2 9901 0fbc 8010  d......W........

    0x0030:  005b d9e0 0000 0101 080a 8e8c e8ed 42a0  .[............B.

    0x0040:  aaba

                                ..

6. Снова запустить анализатор сетевого трафика с фильтром пакетов, получаемых и передаваемых от узла 172.16.100.88 c tcp-портом источника и назначения 22.

7. Открыть второй эмулятор терминала и с помощью команды user@host :[~] $ ssh -l student_nn 172.16.100.88 попытаться установить шифрованное соединение с удаленным сервером. Отметить взаимодействующие TCP-порты.

14:51:54.081892 IP (tos 0x0, ttl 64, id 22664, offset 0, flags [DF], proto TCP (6), length 52)

172.16.100.21.39248 > 172.16.100.88.22: Flags [.], cksum 0xbc5e (correct), ack 33, win 229, options [nop,nop,TS val 1104791547 ecr 2388340821], length 0

    0x0000:  0019 dbaf 9333 d027 88cf e290 0800 4500  .....3.'......E.

    0x0010:  0034 5888 4000 4006 c1ad ac10 6415 ac10  .4X.@.@.....d...

    0x0020:  6458 9950 0016 abab 277c 4749 1c8e 8010  dX.P....'|GI....

    0x0030:  00e5 bc5e 0000 0101 080a 41d9 c7fb 8e5b  ...^......A....[

    0x0040:  3055                                 0U

8. Подключившись к удаленной системе, ввести пароль stud и выполнить команду uname -a, выведя информацию об удаленной системе.

9. В домашнем каталоге пользователя создать текстовый файл с содержанием ФИО и номера лабораторного ПК. С помощью команды передать его по шифрованному каналу на удаленную систему. Проверить наличие копии переданного файла на удаленном узле, воспользовавшись файловым менеджером Midnight Commander (команда mc на удаленной системе).

Executing: program /usr/bin/ssh host 172.16.100.88, user (unspecified), command scp -v -t /home/student_01/

OpenSSH_7.9p1 Debian-9, OpenSSL 1.1.1b  26 Feb 2019

debug1: Reading configuration data /etc/ssh/ssh_config

debug1: /etc/ssh/ssh_config line 19: Applying options for *

debug1: Connecting to 172.16.100.88 [172.16.100.88] port 22.

debug1: Connection established.

debug1: identity file /home/student/.ssh/id_rsa type -1

debug1: identity file /home/student/.ssh/id_rsa-cert type -1

debug1: identity file /home/student/.ssh/id_dsa type -1

debug1: identity file /home/student/.ssh/id_dsa-cert type -1

debug1: identity file /home/student/.ssh/id_ecdsa type -1

debug1: identity file /home/student/.ssh/id_ecdsa-cert type -1

debug1: identity file /home/student/.ssh/id_ed25519 type -1

debug1: identity file /home/student/.ssh/id_ed25519-cert type -1

debug1: identity file /home/student/.ssh/id_xmss type -1

debug1: identity file /home/student/.ssh/id_xmss-cert type -1

debug1: Local version string SSH-2.0-OpenSSH_7.9p1 Debian-9

debug1: Remote protocol version 2.0, remote software version OpenSSH_5.1p1 Debian-5

debug1: match: OpenSSH_5.1p1 Debian-5 pat OpenSSH_5* compat 0x0c000002

debug1: Authenticating to 172.16.100.88:22 as 'student_01'

debug1: SSH2_MSG_KEXINIT sent

debug1: SSH2_MSG_KEXINIT received

debug1: kex: algorithm: diffie-hellman-group-exchange-sha256

debug1: kex: host key algorithm: ssh-rsa

debug1: kex: server->client cipher: aes128-ctr MAC: umac-64@openssh.com compression: none

debug1: kex: client->server cipher: aes128-ctr MAC: umac-64@openssh.com compression: none

debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(2048<3072<8192) sent

debug1: got SSH2_MSG_KEX_DH_GEX_GROUP

debug1: SSH2_MSG_KEX_DH_GEX_INIT sent

debug1: got SSH2_MSG_KEX_DH_GEX_REPLY

debug1: Server host key: ssh-rsa SHA256:toYD69y6puKpyeDYai8x1vg92nxr2YcH57HBVaUzKBs

debug1: Host '172.16.100.88' is known and matches the RSA host key.

debug1: Found key in /home/student/.ssh/known_hosts:4

debug1: rekey after 4294967296 blocks

debug1: SSH2_MSG_NEWKEYS sent

debug1: expecting SSH2_MSG_NEWKEYS

debug1: SSH2_MSG_NEWKEYS received

debug1: rekey after 4294967296 blocks

debug1: Will attempt key: /home/student/.ssh/id_rsa

debug1: Will attempt key: /home/student/.ssh/id_dsa

debug1: Will attempt key: /home/student/.ssh/id_ecdsa

debug1: Will attempt key: /home/student/.ssh/id_ed25519

debug1: Will attempt key: /home/student/.ssh/id_xmss

debug1: SSH2_MSG_SERVICE_ACCEPT received

debug1: Authentications that can continue: publickey,password

debug1: Next authentication method: publickey

debug1: Trying private key: /home/student/.ssh/id_rsa

debug1: Trying private key: /home/student/.ssh/id_dsa

debug1: Trying private key: /home/student/.ssh/id_ecdsa

debug1: Trying private key: /home/student/.ssh/id_ed25519

debug1: Trying private key: /home/student/.ssh/id_xmss

debug1: Next authentication method: password

student_01@172.16.100.88's password:

debug1: Authentication succeeded (password).

Authenticated to 172.16.100.88 ([172.16.100.88]:22).

debug1: channel 0: new [client-session]

debug1: Requesting no-more-sessions@openssh.com

debug1: Entering interactive session.

debug1: pledge: network

debug1: Sending environment.

debug1: Sending env LANG = ru_RU.UTF-8

debug1: Sending command: scp -v -t /home/student_01/

Sending file modes: C0644 26 lab_04.txt

lab_04.txt                                 0% 0 0.0KB/s   --:-- ETASink: C0644 26 lab_04.txt

lab_04.txt                               100%   26 49.8KB/s   00:00    

debug1: client_input_channel_req: channel 0 rtype exit-status reply 0

debug1: channel 0: free: client-session, nchannels 1

debug1: fd 0 clearing O_NONBLOCK

Transferred: sent 2440, received 2568 bytes, in 0.0 seconds

Bytes per second: sent 221395.2, received 233009.4

debug1: Exit status 0