arpspoof deception and deceit arpspoof defense and defensive measures

arpspoof deception and defensive measures

 

By forging arpspoof arp Reply Packet to the host LAN A (or all hosts) the packets are redirected to the host network B.

Version: 2.4

Usage: arpspoof [-i interface] [-c own|host|both] [-t target] [-r] host 

Description:

-i attack aircraft designated network interface (NIC name).

-c own|host|both 

-t target arp attacks. If not specified, the target for all the machines within the LAN.

-r hope to intercept communications between the attackers and which host, usually a gateway.

arpspoof -i -t card gateway target ip

 

Route Forwarding

First, open the routing forwarding before the attack, otherwise it will cause the target ip not receive data

open IP forwarding: echo 1> / proc / sys / net / ipv4 / ip_forward
disable IP forwarding: echo 0> / proc / sys / net / ipv4 / ip_forward


View IP forwarding was successful: cat / proc / sys / net / ipv4 / ip_forward 

 

 

Attached: arpspoof after a successful real-time view of browsing the picture of the attacker

 

Image capture tool Driftnet

driftnet is an easy to use image capture tools, you can easily grab picture in network packets. The tool can capture real-time and offline data packets specified in the picture.

Syntax : driftnet [options] [filter code ]

parameter:

 -B to sound when capturing a new image

-i interface selection listener interfaces

-f file Reads a specified pcap packet Pictures

-p is listening interface does not use promiscuous mode

-a background mode: save the captured images to the directory (not displayed on the screen)

-m number Specifies the number of pictures stored numbers

-d directory specify the path to save the image

-x prefix specified prefix to save the image

 

By forging arpspoof arp Reply Packet to the host LAN A (or all hosts) the packets are redirected to the host network B.

Version: 2.4

Usage: arpspoof [-i interface] [-c own|host|both] [-t target] [-r] host 

Description:

-i attack aircraft designated network interface (NIC name).

-c own|host|both 

-t target arp attacks. If not specified, the target for all the machines within the LAN.

-r hope to intercept communications between the attackers and which host, usually a gateway.

arpspoof -i -t card gateway target ip

 

Route Forwarding

First, open the routing forwarding before the attack, otherwise it will cause the target ip not receive data

open IP forwarding: echo 1> / proc / sys / net / ipv4 / ip_forward
disable IP forwarding: echo 0> / proc / sys / net / ipv4 / ip_forward


View IP forwarding was successful: cat / proc / sys / net / ipv4 / ip_forward 

 

 

Attached: arpspoof after a successful real-time view of browsing the picture of the attacker

 

Image capture tool Driftnet

driftnet is an easy to use image capture tools, you can easily grab picture in network packets. The tool can capture real-time and offline data packets specified in the picture.

Syntax : driftnet [options] [filter code ]

parameter:

 -B to sound when capturing a new image

-i interface selection listener interfaces

-f  file              读取一个指定pcap数据包中的图片

-p                    所监听的接口不使用混杂模式

-a                    后台模式:将捕获的图片保存到目录中(不会显示在屏幕上)

-m                   number 指定保存图片数的数目

-d                    directory  指定保存图片的路径

-x                    prefix  指定保存图片的前缀名

 

driftnet是一款简单而使用的图片捕获工具,可以很方便的在网络数据包中抓取图片。该工具可以实时和离线捕获指定数据包中的图片。

语法: driftnet   [options]   [filter code]

参数:

 -b                   捕获到新的图片时发出声音

-i  interface     选择监听接口

-f  file              读取一个指定pcap数据包中的图片

-p                    所监听的接口不使用混杂模式

-a                    后台模式:将捕获的图片保存到目录中(不会显示在屏幕上)

-m                   number 指定保存图片数的数目

-d                    directory  指定保存图片的路径

-x                    prefix  指定保存图片的前缀名

 

Guess you like

Origin www.cnblogs.com/fdgd88/p/12057769.html