1 of 18

Defense in AaD

2 of 18

Basic of Computer Network

3 of 18

  • Network
  • Nodes
  • Protocol
  • Topology
  • Service Provider Network
  • IP Address
  • DNS
  • Firewall

Basic terminologies:

4 of 18

Network devices

5 of 18

OSI Model:

6 of 18

Packet:

7 of 18

ASCIS Architecture

8 of 18

Faust CTF Architecture

9 of 18

RuCTF Architecture

10 of 18

IPTables

11 of 18

Tables:

INPUT CHAIN

OUTPUT CHAIN

FORWARD CHAIN

FILTER TABLE

OUTPUT CHAIN

PREROUTING CHAIN

POSTROUTING CHAIN

NAT TABLE

INPUT CHAIN

OUTPUT CHAIN

FORWARD CHAIN

MANGLE TABLE

PREROUTING CHAIN

PREROUTING CHAIN

12 of 18

13 of 18

14 of 18

IPTables Flow

15 of 18

Command

  • iptables-save > /tmp/dump.txt
  • iptables -F
  • iptables-restore < /tmp/dump.txt
  • iptables -nvL -t filter
  • iptables -A FORWARD -p tcp –dport 80 -j ACCEPT
  • iptables -I FORWARD 1 -t filter -p tcp \

-d [vulnbox_ip] –dport [service_port] \

-m string –string “[payload]” –algo bm \

[-m string –hex-string “| [hex] |” –algo kmp \]

-j DROP

16 of 18

Demo IPTables

17 of 18

IPTables Alternative

18 of 18

END