arpspoof deception and defensive measures
By forging arpspoof arp Reply Packet to the host LAN A (or all hosts) the packets are redirected to the host network B.
Version: 2.4
Usage: arpspoof [-i interface] [-c own|host|both] [-t target] [-r] host
Description:
-i attack aircraft designated network interface (NIC name).
-c own|host|both
-t target arp attacks. If not specified, the target for all the machines within the LAN.
-r hope to intercept communications between the attackers and which host, usually a gateway.
arpspoof -i -t card gateway target ip
Route Forwarding
First, open the routing forwarding before the attack, otherwise it will cause the target ip not receive data
open IP forwarding: echo 1> / proc / sys / net / ipv4 / ip_forward
disable IP forwarding: echo 0> / proc / sys / net / ipv4 / ip_forward
View IP forwarding was successful: cat / proc / sys / net / ipv4 / ip_forward
Attached: arpspoof after a successful real-time view of browsing the picture of the attacker
Image capture tool Driftnet
driftnet is an easy to use image capture tools, you can easily grab picture in network packets. The tool can capture real-time and offline data packets specified in the picture.
Syntax : driftnet [options] [filter code ]
parameter:
-B to sound when capturing a new image
-i interface selection listener interfaces
-f file Reads a specified pcap packet Pictures
-p is listening interface does not use promiscuous mode
-a background mode: save the captured images to the directory (not displayed on the screen)
-m number Specifies the number of pictures stored numbers
-d directory specify the path to save the image
-x prefix specified prefix to save the image
By forging arpspoof arp Reply Packet to the host LAN A (or all hosts) the packets are redirected to the host network B.
Version: 2.4
Usage: arpspoof [-i interface] [-c own|host|both] [-t target] [-r] host
Description:
-i attack aircraft designated network interface (NIC name).
-c own|host|both
-t target arp attacks. If not specified, the target for all the machines within the LAN.
-r hope to intercept communications between the attackers and which host, usually a gateway.
arpspoof -i -t card gateway target ip
Route Forwarding
First, open the routing forwarding before the attack, otherwise it will cause the target ip not receive data
open IP forwarding: echo 1> / proc / sys / net / ipv4 / ip_forward
disable IP forwarding: echo 0> / proc / sys / net / ipv4 / ip_forward
View IP forwarding was successful: cat / proc / sys / net / ipv4 / ip_forward
Attached: arpspoof after a successful real-time view of browsing the picture of the attacker
Image capture tool Driftnet
driftnet is an easy to use image capture tools, you can easily grab picture in network packets. The tool can capture real-time and offline data packets specified in the picture.
Syntax : driftnet [options] [filter code ]
parameter:
-B to sound when capturing a new image
-i interface selection listener interfaces
-f file 读取一个指定pcap数据包中的图片
-p 所监听的接口不使用混杂模式
-a 后台模式:将捕获的图片保存到目录中(不会显示在屏幕上)
-m number 指定保存图片数的数目
-d directory 指定保存图片的路径
-x prefix 指定保存图片的前缀名
driftnet是一款简单而使用的图片捕获工具,可以很方便的在网络数据包中抓取图片。该工具可以实时和离线捕获指定数据包中的图片。
语法: driftnet [options] [filter code]
参数:
-b 捕获到新的图片时发出声音
-i interface 选择监听接口
-f file 读取一个指定pcap数据包中的图片
-p 所监听的接口不使用混杂模式
-a 后台模式:将捕获的图片保存到目录中(不会显示在屏幕上)
-m number 指定保存图片数的数目
-d directory 指定保存图片的路径
-x prefix 指定保存图片的前缀名