This article tags: Hacker World wifi secure Wireless attack technology public wifi insecure kali+linux
Original address: http://whosmall.com/?post=460
We often say that public Wi-Fi is unsafe, so where is the security? Will your phone or laptop be monitored while the hostile is in the same wifi as you? What bad consequences will there be in addition to being watched on the internet? Between the small partners for WiFi this piece of interest, in this article, first for you to popularize the public WiFi in the How dangerous.
Experimental environment
- A laptop with Kali Linux (impersonating an attacker)
IP address is: 192.168.1.129
- An ordinary laptop (simulating the victim)
IP address is: 192.168.1.137
- The two devices are connected to the same wireless network.
Experiment One
Experimental purpose
Use Kali Linux to monitor the Internet traffic on the victim's computer
Experimental process
In Kali Linux built a practical network monitoring tool--arpspoof, the principle of this tool is to forge the network of ARP communication, to achieve all the data traffic through this tool to be forwarded for traffic monitoring. Original address: http://whosmall.com/?post=460
The first step, of course, is to have Kali Linux access the wireless network
1. Connect a laptop with a Kali Linux virtual machine to a wireless network
Laptop Access Wireless Network
The second step is to edit the settings of the Kali Linux virtual machine, set the network adapter to bridge mode, and tick the replication physical network connection Status
The Virtual machine network adapter is set to bridging mode 1
The Virtual machine network adapter is set to bridging mode 2
The third step is to turn on IP forwarding on Kali Linux so that Kali Linux can be used to forward the victim's internet traffic. (This is a precondition for the victim to surf the Internet traffic through Kali Linux)
On the Kali Linux console, enter the following command to turn on the IP forwarding feature
Command:echo 1 >/proc/sys/net/ipv4/ip_forward
Turn on the IP forwarding function
Fourth, turn on the traffic monitoring software Wireshark, and bind the NIC Kali Linux.
1. On the Kali Linux console, enter the following command to view the NIC that Kali Linux has
Command:ifconfig
View Kali Linux NIC Information
2. Enter command Wireshark in the console to open Wireshark traffic monitoring software
Command:wireshark
Open Wireshark
The error may then be prompted, regardless of it, directly determined.
Prompt error
Tip You are running with the highest administrator privileges, just make sure.
Prompt is using root permission
Bind the NIC and start listening for network card traffic on Kali Linux.
Bind the NIC and listen
The fifth step, start Kali Linux on the Arpspoof, the victim host to implement ARP spoofing, will be killed the host's traffic to Kali Linux network card.
1. Querying the gateway address in the wireless network
Enter command in console:route-n
View Gateway Address
2. ARP spoofing for the victim host
In the console, enter the command:
Command:arpspoof-t address gateway address of the victim host
Turn on ARP spoofing
Enter, start attacking.
It's starting to attack.
Sixth step, simulate the victim surfing the internet, check the Wireshark on Kali Linux, and monitor the traffic to the victim (plays come)
1. Simulated victim visit Baidu
Simulated victim visit Baidu
2. Check the Wireshark on Kali Linux to monitor the traffic to the victim.
The victim's traffic is monitored on Kali Linux.
3. Open one of the HTTP request packets and send the data to us.
Data packet details of the victim's Internet access
From the Internet data packet to get the account password, cookie God horse from now on, here, small white will not go deep.
Experiment Two
Experimental purpose
Using Kali Linux for DNS spoofing
Experimental process
In Kali Linux built a practical man-in-the-middle toolset--ettercap, the Toolset principle and arpspoof consistent, but also through the forgery of the network ARP communication, the realization of all the data traffic through this tool to be forwarded to the data traffic modification.
First step: Enter the Kali/var/www/html directory and create a new index.html file. (This HTML is used to simulate black pages)
The contents of the file are as follows:
Write a malicious page
Step two, open the Kali apache2 service
Enter the command in the console of Kali Linux as follows
Command:/etc/init.d/apache2 start
Open Apache Service
Step three: Open the Ettercap DNS file for editing, the file path under Kali linux2.0 is/etc/ettercap/etter.dns
PS: The added address refers to the address of the Kali Linux.
Modify the DNS resolution file for DNS spoofing
Fourth step: Open the Ettercap tool
Entering commands in the console of Kali Linux
Command:ettercap-g
Turn on the Ettercap graphical tool
Fifth Step: Configure network Information and select an attack target
1. Turn on network sniffing
Turn on network sniffing
2. Select the Kali Linux network card
Select the Kali network card
3. Scan hosts that exist in the current wireless network
Scan host information that exists in a wireless network
4. View the scanned host
Viewing host scan Results
5. Select Target1 as the gateway address and Target2 as the victim's host
Add Gateway and victim IP
Fifth step: Start a DNS spoofing attack
Start attacking
Sixth step, simulate the victim to open any Web page, the browser is displayed in the beginning we set the content of the black page.
Impersonate a victim open any webpage
Summarize
- Understand how ARP spoofing is implemented under Kali Linux
- Learn how DNS spoofing is implemented under Kali Linux
- Understand the causes of public wireless insecurity
- Should have a sense of security, not in the public network to pay, account login and other sensitive operations.
written at the end: For Freedom look outside the world, and it this line, not to go to Google data, finally, Amway an accelerator agent. a red apricot accelerator , go to Google data is the absolute first choice, the connection speed, the use is also convenient. I bought is 99¥ a year, through this link (http://whosmall.com/go/yzhx) registered after the coupon code WH80, lifetime 80 percent , divided down, only 7 yuan per month, special benefits.
This article tags: Hacker World wifi secure Wireless attack technology public wifi insecure kali+linux
Turn from SUN's BLOG-focus on Internet knowledge, share the spirit of the Internet!
Original Address : " beware of public WiFi small white guests take you into the hacker world: Kali Linux under the wireless attack technology "
Related reading: What git can do, how it differs from SVN in depth
Related reading: " share some of the most useful, user-friendly, and feature-rich Google Chrome Extensions for developers "
Related reading: A lot of brief encounter tools or websites that share some of the actual Android development process
related reading:" I am a G powder, has been concerned about Google, recently Google has some little gestures, probably a lot of people do not understand "
related reading:" machine learning leads to technological innovation in the field of cognition, so how can the SaaS industry be changed by machine learning?" "
related reading:"VPS Tutorial Series: DNSMASQ + DNSCrypt + SNI Proxy smooth access to Google configuration tutorial "
Related reading: useful for programmers: 2017 latest in Google's Hosts file download and summary of the various hosts encountered the problem of the solution and configuration of the detailed
Related blog:SUN ' S blog -Focus on Internet knowledge and share the spirit of Internet! Go and see:www.whosmall.com
Original address: http://whosmall.com/?post=460
Beware of the public WiFi small white guests take you into the hacker world: Kali Linux under the wireless attack technology