Network security engineer and white hat*** teach you Kali Linux***: Intranet*** practical skills

Statement before class:
This sharing is only for learning exchanges, please consciously abide by laws and regulations!
Search: Kali and programming, learn more online*** dry goods!
 The next article will be published at 5 o'clock tomorrow afternoon, so stay tuned!

This lesson you will learn how to use the LAN ARP spoofing to steal user account password-related, including:
 how to turn IP forwarding
how  associated account password to steal the victim's
a, how to turn IP forwarding
before computer graphics in the interception of traffic victims In the course, we also talked about how to turn on IP forwarding and how to turn it on. Turning on IP forwarding will enable the victim's computer to connect to the Internet normally, so that it will be convenient for our follow-up ***. Here we are repeating how to turn on IP forwarding.
Enter cat /proc/sys/net/ipv4/ip_forward in the kali terminal to view the value of ip_forward. The cat command is used in Linux to connect files and print them to the standard output device. This command means to /proc/sys The value of ip_forward in the /net/ipv4 directory is printed out. If the value is 0, it means that ip forwarding is turned off; if it is 1, it means that ip forwarding is turned on. What we have to do is to change the value to 1, and continue to enter echo 1> /proc/sys/net/ipv4/ip_forward in the terminal. The echo command can also be used for printing. The ">" redirection symbol is added here, meaning Redirecting 1 to ip_forward means changing the value of ip_forward to 1. For more detailed explanation of Linux commands, please continue to pay attention to the relevant chapters of Kali and programming.
Network security engineer and white hat*** teach you Kali Linux***: Intranet*** practical skills
The assignment in this way is only temporary and will be invalid after restart. If you want to make it take effect permanently, you need to modify the configuration file, enter vim /etc/sysctl.conf, open the file with the vim editor, and find #net.ipv4. ip_forward=1, remove the "#" sign, or enter net.ipv4.ip_forward=1 below it, that is to make net.ipv4.ip_forward=1 take effect, save and exit, it can take effect permanently.
Network security engineer and white hat*** teach you Kali Linux***: Intranet*** practical skills
Network security engineer and white hat*** teach you Kali Linux***: Intranet*** practical skills

At this point, ip forwarding has been enabled, and ARP spoofing is performed at this time, and the victim's computer will not be disconnected from the Internet, so that we can obtain the relevant account password of the victim's computer.
2. Stealing the account and password of the
victim computer is still ARP spoofing the target computer. When the victim computer enters the account and password on a website, we can obtain the corresponding information from the kali computer. Here, ARP spoofing is still used. The principle is very clear in the ARP spoofing overview section. Those who don’t understand can look back and continue to learn. Here, assuming that you already know the ip address of the victim machine, enter arpspoof directly in the kali terminal -i eth0 -t 192.168.0.100 -r 192.168.0.1, -t is followed by the ip address of the target computer, -r can be omitted, followed by the gateway ip address, here we are using a Windows 7 as the victim, and other computers are the same. Enter ettercap -Tq -i eth0 in another terminal and press Enter. This command was also mentioned in the previous interception of target computer image traffic (2), -Tq means silent start in text mode, and -i means behind Monitoring network card.
Network security engineer and white hat*** teach you Kali Linux***: Intranet*** practical skills
At this point, the monitoring has been activated, and we return to the victim's computer to log in using a website. Here we take the website of Zhongguancun Forum as an example, and enter an account password to log in.
Network security engineer and white hat*** teach you Kali Linux***: Intranet*** practical skills
Back in Kali, we found that relevant information has been obtained. We found that the obtained password is encrypted. This is not surprising. Generally, larger websites will encrypt the password. We can decrypt it with related tools. No demonstration is performed here, so that the plaintext can be obtained. Password and related account number.
Network security engineer and white hat*** teach you Kali Linux***: Intranet*** practical skills
The above is the whole content of using ARP spoofing to steal the passwords of the relevant accounts of LAN users. Let's get started!

Ps: This is the end of the study, thank you for watching, for more dry goods, please continue to pay attention to this number!

Hard work and originality, everyone, please remember to praise and pay attention! You can also search: Kali and programming, learn more Kali Linux*** and white hat programming skills!

Click me to learn more Kali Linux*** testing and network*** practical skills! Please add link description

Guess you like

Origin blog.51cto.com/14308022/2536146