Active Information Collection

The first stage: to determine the target IP, and is alive, displaying online IP

Story found:

1, arping -------------- I do not know this ping a network segment

#!/bin/bash
if [ "$#" -ne 1 ]; then
    echo "Example - ./arping.sh eth0"
   exit    
fi
interface=$1
prefix=$(ifconfig $interface | grep 'inet ' |  cut -d ' ' -f 10 | cut -d '.' -f 1-3)
for addr in $(seq 1 254); do
   arping -c 1 $prefix.$addr | grep "bytes from" | cut -d ' ' -f 5 | cut -d "(" -f 2 | cut -d ")" -f 1

2、nmap

nmap -sn 192.168.1.1-254

 

3, netdiscover dedicated Layer found, can be used to switch the wireless network environment and detect active and passive

Initiative: netdiscover -i eth0 -r 192.168.1.0/24

Passive: netdiscover -p (active arp easy departure warning)

 

 

4、scapy

Calling it as a python library can also be used as a standalone tool, packet capture, analyze, create, modify, injected into the network traffic

apt-get install -y python-gnuplot

ARP().display()

SR1 ()

python script

arp1.py

arp2.py

root @ kali: ~ # scapy ------------------ you are entering the program

 

 

Guess you like

Origin www.cnblogs.com/scorpios/p/11462695.html