Kali 分析和管理网络

查看网络

ifconfig 命令

┌──(root㉿kali)-[~] # eth0:有线网卡
└─# ifconfig
eth0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST>  mtu 1500
        inet 192.168.56.128  netmask 255.255.255.0  broadcast 192.168.56.255
        inet6 fe80::20c:29ff:feb3:7991  prefixlen 64  scopeid 0x20<link>
        ether 00:0c:29:b3:79:91  txqueuelen 1000  (Ethernet)
        RX packets 39  bytes 17736 (17.3 KiB)
        RX errors 0  dropped 0  overruns 0  frame 0
        TX packets 45  bytes 17169 (16.7 KiB)
        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0

lo: flags=73<UP,LOOPBACK,RUNNING>  mtu 65536
        inet 127.0.0.1  netmask 255.0.0.0
        inet6 ::1  prefixlen 128  scopeid 0x10<host>
        loop  txqueuelen 1000  (Local Loopback)
        RX packets 4  bytes 240 (240.0 B)
        RX errors 0  dropped 0  overruns 0  frame 0
        TX packets 4  bytes 240 (240.0 B)
        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0

 
┌──(root㉿kali)-[~] # ifconfig -a 查看所有的接口
└─# ifconfig -a
eth0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST>  mtu 1500
        inet 192.168.56.128  netmask 255.255.255.0  broadcast 192.168.56.255
        inet6 fe80::20c:29ff:feb3:7991  prefixlen 64  scopeid 0x20<link>
        ether 00:0c:29:b3:79:91  txqueuelen 1000  (Ethernet)
        RX packets 100  bytes 21639 (21.1 KiB)
        RX errors 0  dropped 0  overruns 0  frame 0
        TX packets 51  bytes 17593 (17.1 KiB)
        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0

lo: flags=73<UP,LOOPBACK,RUNNING>  mtu 65536
        inet 127.0.0.1  netmask 255.0.0.0
        inet6 ::1  prefixlen 128  scopeid 0x10<host>
        loop  txqueuelen 1000  (Local Loopback)
        RX packets 4  bytes 240 (240.0 B)
        RX errors 0  dropped 0  overruns 0  frame 0
        TX packets 4  bytes 240 (240.0 B)
        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0

┌──(root㉿kali)-[~]
└─# ifdown eth0
ifdown: unknown interface eth0
                                                                                               
┌──(root㉿kali)-[~] # ifconfig eth0 down 停用eth0这块网卡
└─# ifconfig etho down
etho: ERROR while getting interface flags: 没有那个设备
                                                                                               
┌──(root㉿kali)-[~]
└─# ifconfig eth0 down

  ┌──(root㉿kali)-[~]
└─# ifconfig          
lo: flags=73<UP,LOOPBACK,RUNNING>  mtu 65536
        inet 127.0.0.1  netmask 255.0.0.0
        inet6 ::1  prefixlen 128  scopeid 0x10<host>
        loop  txqueuelen 1000  (Local Loopback)
        RX packets 4  bytes 240 (240.0 B)
        RX errors 0  dropped 0  overruns 0  frame 0
        TX packets 4  bytes 240 (240.0 B)
        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0
 
┌──(root㉿kali)-[~] -a 查看所有活动和不活动的网卡
└─# ifconfig -a       
eth0: flags=4098<BROADCAST,MULTICAST>  mtu 1500
        ether 00:0c:29:b3:79:91  txqueuelen 1000  (Ethernet)
        RX packets 137  bytes 23889 (23.3 KiB)
        RX errors 0  dropped 0  overruns 0  frame 0
        TX packets 55  bytes 17865 (17.4 KiB)
        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0

lo: flags=73<UP,LOOPBACK,RUNNING>  mtu 65536
        inet 127.0.0.1  netmask 255.0.0.0
        inet6 ::1  prefixlen 128  scopeid 0x10<host>
        loop  txqueuelen 1000  (Local Loopback)
        RX packets 4  bytes 240 (240.0 B)
        RX errors 0  dropped 0  overruns 0  frame 0
        TX packets 4  bytes 240 (240.0 B)
        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0
 

┌──(root㉿kali)-[~] #  ifconfig eth0 up 启用这块网卡
└─# ifconfig eth0 up  
                                                                                               
┌──(root㉿kali)-[~]
└─# ifconfig        
eth0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST>  mtu 1500
        inet 192.168.56.128  netmask 255.255.255.0  broadcast 192.168.56.255
        inet6 fe80::20c:29ff:feb3:7991  prefixlen 64  scopeid 0x20<link>
        ether 00:0c:29:b3:79:91  txqueuelen 1000  (Ethernet)
        RX packets 142  bytes 24471 (23.8 KiB)
        RX errors 0  dropped 0  overruns 0  frame 0
        TX packets 65  bytes 18883 (18.4 KiB)
        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0

lo: flags=73<UP,LOOPBACK,RUNNING>  mtu 65536
        inet 127.0.0.1  netmask 255.0.0.0
        inet6 ::1  prefixlen 128  scopeid 0x10<host>
        loop  txqueuelen 1000  (Local Loopback)
        RX packets 4  bytes 240 (240.0 B)
        RX errors 0  dropped 0  overruns 0  frame 0
        TX packets 4  bytes 240 (240.0 B)
        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0
    

iwconfig 检查无线网卡

┌──(root㉿kali)-[~]
└─# iwconfig   
lo        no wireless extensions.

eth0      no wireless extensions.

Kali 分析和管理网络_第1张图片

查看ifconfig 参数

# eth0: 网卡名称,不固定
# inet:IP地址
# netmask :子网掩码
# broadcast :广播地址
# inet6 :支持ipv6
# ether :mac地址
# 1000  :传输速率1000M
# RX packets:接收了多少个报文
# TX packets:发送了多少个报文
# RX errors:是否丢包
eth0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST>  mtu 1500
        inet 192.168.56.128  netmask 255.255.255.0  broadcast 192.168.56.255
        inet6 fe80::20c:29ff:feb3:7991  prefixlen 64  scopeid 0x20<link>
        ether 00:0c:29:b3:79:91  txqueuelen 1000  (Ethernet)
        RX packets 142  bytes 24471 (23.8 KiB)
        RX errors 0  dropped 0  overruns 0  frame 0
        TX packets 65  bytes 18883 (18.4 KiB)
        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0

ip 命令

查看IP地址 不能查看ip的状态 是否丢包


┌──(root㉿kali)-[~] # ip address show
└─# ip address show
1: lo:  mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
    inet 127.0.0.1/8 scope host lo
       valid_lft forever preferred_lft forever
    inet6 ::1/128 scope host noprefixroute 
       valid_lft forever preferred_lft forever
2: eth0:  mtu 1500 qdisc fq_codel state UP group default qlen 1000
    link/ether 00:0c:29:b3:79:91 brd ff:ff:ff:ff:ff:ff
    inet 192.168.56.128/24 brd 192.168.56.255 scope global dynamic noprefixroute eth0
       valid_lft 1380sec preferred_lft 1380sec
    inet6 fe80::20c:29ff:feb3:7991/64 scope link noprefixroute 
       valid_lft forever preferred_lft forever
                                                                                               
┌──(root㉿kali)-[~]
└─# ip a               
1: lo:  mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
    inet 127.0.0.1/8 scope host lo
       valid_lft forever preferred_lft forever
    inet6 ::1/128 scope host noprefixroute 
       valid_lft forever preferred_lft forever
2: eth0:  mtu 1500 qdisc fq_codel state UP group default qlen 1000
    link/ether 00:0c:29:b3:79:91 brd ff:ff:ff:ff:ff:ff
    inet 192.168.56.128/24 brd 192.168.56.255 scope global dynamic noprefixroute eth0
       valid_lft 1377sec preferred_lft 1377sec
    inet6 fe80::20c:29ff:feb3:7991/64 scope link noprefixroute 
       valid_lft forever preferred_lft forever
                                                                                               
┌──(root㉿kali)-[~]
└─# ip -help
Usage: ip [ OPTIONS ] OBJECT { COMMAND | help }
       ip [ -force ] -batch filename
where  OBJECT := { address | addrlabel | amt | fou | help | ila | ioam |  |
                   link | macsec | maddress | monitor | mptcp | mroute | mrule |
                   neighbor | neighbour | netconf | netns | nexthop | ntable |
                   ntbl | route | rule | sr | tap | tcpmetrics |
                   token | tunnel | tuntap | vrf | xfrm }
       OPTIONS := { -V[ersion] | -s[tatistics] | -d[etails] | -r[esolve] |
                    -h[uman-readable] | -iec | -j[son] | -p[retty] |
                    -f[amily] { inet | inet6 | mpls | bridge | link } |
                    -4 | -6 | -M | -B | -0 |
                    -l[oops] { maximum-addr-flush-attempts } | -br[ief] |
                    -o[neline] | -t[imestamp] | -ts[hort] | -b[atch] [filename] |
                    -rc[vbuf] [size] | -n[etns] name | -N[umeric] | -a[ll] |
                    -c[olor]}

更改IP地址

临时更改

ifconfig eth0 192.168.56.66 使用的是默认子网掩码 应用场景:排错,调试网络

┌──(root㉿kali)-[~]
└─# ip a    
1: lo:  mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
    inet 127.0.0.1/8 scope host lo
       valid_lft forever preferred_lft forever
    inet6 ::1/128 scope host noprefixroute 
       valid_lft forever preferred_lft forever
2: eth0:  mtu 1500 qdisc fq_codel state UP group default qlen 1000
    link/ether 00:0c:29:b3:79:91 brd ff:ff:ff:ff:ff:ff
    inet 192.168.56.128/24 brd 192.168.56.255 scope global dynamic noprefixroute eth0
       valid_lft 1202sec preferred_lft 1202sec
    inet6 fe80::20c:29ff:feb3:7991/64 scope link noprefixroute 
       valid_lft forever preferred_lft forever
                                                                                               
┌──(root㉿kali)-[~]
└─# ifconfig eth0 192.168.56.66
                                                                                               
┌──(root㉿kali)-[~]
└─# ip a                       
1: lo:  mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
    inet 127.0.0.1/8 scope host lo
       valid_lft forever preferred_lft forever
    inet6 ::1/128 scope host noprefixroute 
       valid_lft forever preferred_lft forever
2: eth0:  mtu 1500 qdisc fq_codel state UP group default qlen 1000
    link/ether 00:0c:29:b3:79:91 brd ff:ff:ff:ff:ff:ff
    inet 192.168.56.66/24 brd 192.168.56.255 scope global noprefixroute eth0
       valid_lft forever preferred_lft forever
    inet6 fe80::20c:29ff:feb3:7991/64 scope link noprefixroute 
       valid_lft forever preferred_lft forever

## 为什么是临时更改,可以通过停用之后再启用,ip还是之前的

┌──(root㉿kali)-[~]
└─# ifconfig eth0 down         
                                                                                               
┌──(root㉿kali)-[~]
└─# ifconfig eth0 up  
                                                                                               
┌──(root㉿kali)-[~]
└─# ip a              
1: lo:  mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
    inet 127.0.0.1/8 scope host lo
       valid_lft forever preferred_lft forever
    inet6 ::1/128 scope host noprefixroute 
       valid_lft forever preferred_lft forever
2: eth0:  mtu 1500 qdisc fq_codel state UP group default qlen 1000
    link/ether 00:0c:29:b3:79:91 brd ff:ff:ff:ff:ff:ff
    inet 192.168.56.128/24 brd 192.168.56.255 scope global dynamic noprefixroute eth0
       valid_lft 1797sec preferred_lft 1797sec
    inet6 fe80::20c:29ff:feb3:7991/64 scope link noprefixroute 
       valid_lft forever preferred_lft forever


## 指定IP地址的时候同时指定子网掩码
┌──(root㉿kali)-[~]
└─# ifconfig eth0 10.1.1.1                      
                                                                                               
┌──(root㉿kali)-[~]
└─# ifconfig               
eth0: flags=4163  mtu 1500
        inet 10.1.1.1  netmask 255.0.0.0  broadcast 10.255.255.255
        inet6 fe80::20c:29ff:feb3:7991  prefixlen 64  scopeid 0x20
        ether 00:0c:29:b3:79:91  txqueuelen 1000  (Ethernet)
        RX packets 363  bytes 38409 (37.5 KiB)
        RX errors 0  dropped 0  overruns 0  frame 0
        TX packets 89  bytes 20795 (20.3 KiB)
        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0

lo: flags=73  mtu 65536
        inet 127.0.0.1  netmask 255.0.0.0
        inet6 ::1  prefixlen 128  scopeid 0x10
        loop  txqueuelen 1000  (Local Loopback)
        RX packets 4  bytes 240 (240.0 B)
        RX errors 0  dropped 0  overruns 0  frame 0
        TX packets 4  bytes 240 (240.0 B)
        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0


##
┌──(root㉿kali)-[~]
└─# ifconfig eth0 10.1.1.1 netmask 255.255.255.0
                                                                                               
┌──(root㉿kali)-[~]
└─# ifconfig                                    
eth0: flags=4163  mtu 1500
        inet 10.1.1.1  netmask 255.255.255.0  broadcast 10.1.1.255
        inet6 fe80::20c:29ff:feb3:7991  prefixlen 64  scopeid 0x20
        ether 00:0c:29:b3:79:91  txqueuelen 1000  (Ethernet)
        RX packets 388  bytes 39909 (38.9 KiB)
        RX errors 0  dropped 0  overruns 0  frame 0
        TX packets 90  bytes 20857 (20.3 KiB)
        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0

lo: flags=73  mtu 65536
        inet 127.0.0.1  netmask 255.0.0.0
        inet6 ::1  prefixlen 128  scopeid 0x10
        loop  txqueuelen 1000  (Local Loopback)
        RX packets 4  bytes 240 (240.0 B)
        RX errors 0  dropped 0  overruns 0  frame 0
        TX packets 4  bytes 240 (240.0 B)
        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0

在Kali中如何使用无线网卡连接WiFi

  1. 先在主机中使用无线网卡连接WiFi
  1. 在对应官网下载网卡驱动
  1. 在虚拟机中添加USB控制器
  1. 查看网络接口 ifconfig -a
  1. 如果无线网络处于不活动状态,使用ifconfig wlan0 up 启用无线网卡
  1. 使用iwconfig 收集无线网卡的信息

Kali 分析和管理网络_第2张图片

Kali 分析和管理网络_第3张图片
Kali 分析和管理网络_第4张图片
Kali 分析和管理网络_第5张图片
查看连接

使用iwconfig 收集无线网卡的信息数据解析

## IEEE 802.11 : 无线网络的标准 包含 802.11 a/b/g/
## 802.11n(支持2.4GHz和5GHz 理论带宽最高600Mpbs)
## 
wlan0 IEEE 802.11 EssID:off/any
      Mode:Managed Access       Point: Not-Associated Tx-Power=20 dBm
      Retry short limit:7  RTs thr:off Fragment thr:off
      Encryption key:off
      Power Management :off

## 连接上WiFi的数据解析
## ESSID 无线WiFi标识
## Access Point: AP,无线接入点,值为MAC地址
## Mode:Managed :当前无线网卡的模式Managed :客户端模式,连接WiFi通常使用的模式;
## Mode:Monitor(监视)或(promiscuous 混插模式):在破解无线密码时,我们需要使用到混杂模式(promiscuous mode)或Moditor模式;在这种模式下,网卡处于嗅探状态(被成为Passive状态,被动状态)
## Bit Rate=150 Mb/s :传输速率
## Tx-Power:功率


wlan0	IEEE 802.11	ESSID:"Xiaomi 20A8"
		Mode:Managed	Frequency:2.437 GHz Access Point: 88:C3:97:C2:F1:4E
		Bit Rate=150 Mb/s	Tx-Power=20 dBm
		Retry short limit:7	RTS thr:off	Fragment thr:off
		Encryption key:off
		Power Management :off
		Link Quality=70/70 Siqnal level=-36 dBm
		Rx invalid nwid;0 Rx invalid crypt:0 Rx invalid frag:0
		Tx excessive retries:0   Invalid misc:16Missed beacon:0
  1. 连接指定的WiFi:推荐使用图形化界面连接WiFi

PS:前提:NetworkManager 服务要开启(服务名称区分大小写) systemtcl status NetworkManager

在kali中查看你的无线网卡是否可以用于无线攻击

## iw list 查看无线网卡支持的模式
Supported interface modes :
		*IBSS
		*managed
		*AP ()
		*AP/VLANt
		*monitor ()
		*mesh point
		*P2P-client
		*P2P-GO
		*outside context of a BSS

## 查看是否支持数据包的注入功能
aireplay-ng -9 wlan0

Kali 分析和管理网络_第6张图片

更改MAC地址

MAC地址的欺骗

MAC地址是全球唯一的,48位,16进制表示;前24位代表厂商地址

防范:通常被用作一种安全措施,以防止黑客进入网络或追踪他们

攻击: 更改MAC地址来伪装成一个不同的MAC地址使得上述安全措施无效

Kali 分析和管理网络_第7张图片
#PS 地址查询 MAC地址
Kali 分析和管理网络_第8张图片

## ncpa.cpl --网络连接
## arp协议 --把IP地址解析成MAC地址 arp -a 查看arp缓存
## arp -d 192.168.56.128 删除arp指定缓存
C:\Users\Administrator>arp -d 192.168.56.128 

## kali中打开嗅探工具

## 更改MAC 地址
## 方法1: ifconfig eth0 hw ether 00:0c:29:76:ad:99
                                                                                               
┌──(root㉿kali)-[~]
└─# ifconfig eth0 down
  
┌──(root㉿kali)-[~]
└─# ifconfig eth0 hw ether 00:0c:29:76:ad:99
                                                                                               
┌──(root㉿kali)-[~]
└─# ifconfig eth0 up                        
                                                                                               
┌──(root㉿kali)-[~]
└─# ifconfig        
eth0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST>  mtu 1500
        inet 192.168.56.129  netmask 255.255.255.0  broadcast 192.168.56.255
        inet6 fe80::20c:29ff:fe76:ad99  prefixlen 64  scopeid 0x20<link>
        ether 00:0c:29:76:ad:99  txqueuelen 1000  (Ethernet)
        RX packets 1541  bytes 115390 (112.6 KiB)
        RX errors 0  dropped 0  overruns 0  frame 0
        TX packets 185  bytes 30203 (29.4 KiB)
        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0

┌──(root㉿kali)-[~]
└─# macchanger -s eth0
Current MAC:   00:0c:29:76:ad:99 (VMware, Inc.) ## 当前MAC地址
Permanent MAC: 00:0c:29:b3:79:91 (VMware, Inc.) ## 永久MAC地址

Kali 分析和管理网络_第9张图片
arp协议

嗅探

打开kali 嗅探工具

Kali 分析和管理网络_第10张图片

选择监听

Kali 分析和管理网络_第11张图片

查看捕获数据

Kali 分析和管理网络_第12张图片

方法2:macchager 更改mac地址

┌──(root㉿kali)-[~]
└─# macchanger -h     
GNU MAC Changer
Usage: macchanger [options] device

  -h,  --help                   Print this help
  -V,  --version                Print version and exit
  -s,  --show                   Print the MAC address and exit
  -e,  --ending                 Don't change the vendor bytes
  -a,  --another                Set random vendor MAC of the same kind
  -A                            Set random vendor MAC of any kind
  -p,  --permanent              Reset to original, permanent hardware MAC
  -r,  --random                 Set fully random MAC
  -l,  --list[=keyword]         Print known vendors
  -b,  --bia                    Pretend to be a burned-in-address
  -m,  --mac=XX:XX:XX:XX:XX:XX
       --mac XX:XX:XX:XX:XX:XX  Set the MAC XX:XX:XX:XX:XX:XX

## macchanger eth0 -m  00:0c:29:76:ad:97
┌──(root㉿kali)-[~]
└─# macchanger eth0 -m  00:0c:29:76:ad:97
Current MAC:   00:0c:29:76:ad:99 (VMware, Inc.)
Permanent MAC: 00:0c:29:b3:79:91 (VMware, Inc.)
New MAC:       00:0c:29:76:ad:97 (VMware, Inc.)

通过DHCP服务器获取IP地址

DHCP协议 - 动态主机配置协议

Server:UDP/67 Linux下的DHCP服务(daemon,在后台进行)进程 dhcpd

Client:UDP/68

DHCP 服务器为子网上的所有机器分配 IP 地址,并在随时维护将 IP地址分配给哪台机器的日志文件。这使得它成为取证分析人员在攻击后追踪黑客的绝佳资源。出于这个原因,了解 DHCP 服务器的工作原理对一名黑客很有用。

## Linux下DHCP客户端调试工具 dhclient

┌──(root㉿kali)-[~]
└─# dhclient -h     
Usage: dhclient [-4|-6] [-SNTPRI1dvrxi] [-nw] [-p ] [-D LL|LLT]
                [--dad-wait-time ] [--prefix-len-hint ]
                [--decline-wait-time ]
                [--address-prefix-len ]
                [-s server-addr] [-cf config-file]
                [-df duid-file] [-lf lease-file]
                [-pf pid-file] [--no-pid] [-e VAR=val]
                [-sf script-file] [interface]*
       dhclient {--version|--help|-h}


┌──(root㉿kali)-[~] ## dhclient -r 释放IP
└─# dhclient eth0 -r 
Killed old client process


┌──(root㉿kali)-[~]
└─# dhclient eth0
                                                                                               
┌──(root㉿kali)-[~]
└─# ifconfig 
eth0: flags=4163  mtu 1500
        inet 192.168.56.131  netmask 255.255.255.0  broadcast 192.168.56.255
        inet6 fe80::20c:29ff:fe76:ad97  prefixlen 64  scopeid 0x20
        ether 00:0c:29:76:ad:97  txqueuelen 1000  (Ethernet)
        RX packets 3121  bytes 216303 (211.2 KiB)
        RX errors 0  dropped 0  overruns 0  frame 0
        TX packets 279  bytes 45281 (44.2 KiB)
        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0

配合嗅探工具进行分析

Kali 分析和管理网络_第13张图片
Kali 分析和管理网络_第14张图片

DCHP报文类型

Kali 分析和管理网络_第15张图片

你可能感兴趣的:(个人学习,服务器,linux,运维)