The first stage: to determine the target IP, and is alive, displaying online IP
Story found:
1, arping -------------- I do not know this ping a network segment
#!/bin/bash
if [ "$#" -ne 1 ]; then
echo "Example - ./arping.sh eth0"
exit
fi
interface=$1
prefix=$(ifconfig $interface | grep 'inet ' | cut -d ' ' -f 10 | cut -d '.' -f 1-3)
for addr in $(seq 1 254); do
arping -c 1 $prefix.$addr | grep "bytes from" | cut -d ' ' -f 5 | cut -d "(" -f 2 | cut -d ")" -f 1
2、nmap
nmap -sn 192.168.1.1-254
3, netdiscover dedicated Layer found, can be used to switch the wireless network environment and detect active and passive
Initiative: netdiscover -i eth0 -r 192.168.1.0/24
Passive: netdiscover -p (active arp easy departure warning)
4、scapy
Calling it as a python library can also be used as a standalone tool, packet capture, analyze, create, modify, injected into the network traffic
apt-get install -y python-gnuplot
ARP().display()
SR1 ()
python script
arp1.py
arp2.py
root @ kali: ~ # scapy ------------------ you are entering the program