Beware of the public WiFi small white guests take you into the hacker world: Kali Linux under the wireless attack technology

Source: Internet
Author: User
Tags kali linux dns spoofing

This article tags: Hacker World wifi secure Wireless attack technology public wifi insecure kali+linux

Original address: http://whosmall.com/?post=460

We often say that public Wi-Fi is unsafe, so where is the security? Will your phone or laptop be monitored while the hostile is in the same wifi as you? What bad consequences will there be in addition to being watched on the internet? Between the small partners for WiFi this piece of interest, in this article, first for you to popularize the public WiFi in the How dangerous.

Experimental environment
    • A laptop with Kali Linux (impersonating an attacker)
      IP address is: 192.168.1.129
    • An ordinary laptop (simulating the victim)
      IP address is: 192.168.1.137
    • The two devices are connected to the same wireless network.
Experiment One

Experimental purpose

Use Kali Linux to monitor the Internet traffic on the victim's computer

Experimental process

In Kali Linux built a practical network monitoring tool--arpspoof, the principle of this tool is to forge the network of ARP communication, to achieve all the data traffic through this tool to be forwarded for traffic monitoring. Original address: http://whosmall.com/?post=460

The first step, of course, is to have Kali Linux access the wireless network

1. Connect a laptop with a Kali Linux virtual machine to a wireless network

Laptop Access Wireless Network

The second step is to edit the settings of the Kali Linux virtual machine, set the network adapter to bridge mode, and tick the replication physical network connection Status

The Virtual machine network adapter is set to bridging mode 1

The Virtual machine network adapter is set to bridging mode 2

The third step is to turn on IP forwarding on Kali Linux so that Kali Linux can be used to forward the victim's internet traffic. (This is a precondition for the victim to surf the Internet traffic through Kali Linux)

On the Kali Linux console, enter the following command to turn on the IP forwarding feature
Command:echo 1 >/proc/sys/net/ipv4/ip_forward

Turn on the IP forwarding function

Fourth, turn on the traffic monitoring software Wireshark, and bind the NIC Kali Linux.

1. On the Kali Linux console, enter the following command to view the NIC that Kali Linux has
Command:ifconfig

View Kali Linux NIC Information


2. Enter command Wireshark in the console to open Wireshark traffic monitoring software
Command:wireshark

Open Wireshark


The error may then be prompted, regardless of it, directly determined.

Prompt error


Tip You are running with the highest administrator privileges, just make sure.

Prompt is using root permission


Bind the NIC and start listening for network card traffic on Kali Linux.

Bind the NIC and listen

The fifth step, start Kali Linux on the Arpspoof, the victim host to implement ARP spoofing, will be killed the host's traffic to Kali Linux network card.

1. Querying the gateway address in the wireless network
Enter command in console:route-n

View Gateway Address


2. ARP spoofing for the victim host
In the console, enter the command:
Command:arpspoof-t address gateway address of the victim host

Turn on ARP spoofing


Enter, start attacking.

It's starting to attack.

Sixth step, simulate the victim surfing the internet, check the Wireshark on Kali Linux, and monitor the traffic to the victim (plays come)

1. Simulated victim visit Baidu

Simulated victim visit Baidu


2. Check the Wireshark on Kali Linux to monitor the traffic to the victim.

The victim's traffic is monitored on Kali Linux.


3. Open one of the HTTP request packets and send the data to us.

Data packet details of the victim's Internet access

From the Internet data packet to get the account password, cookie God horse from now on, here, small white will not go deep.

Experiment Two

Experimental purpose

Using Kali Linux for DNS spoofing

Experimental process

In Kali Linux built a practical man-in-the-middle toolset--ettercap, the Toolset principle and arpspoof consistent, but also through the forgery of the network ARP communication, the realization of all the data traffic through this tool to be forwarded to the data traffic modification.

First step: Enter the Kali/var/www/html directory and create a new index.html file. (This HTML is used to simulate black pages)

The contents of the file are as follows:

Write a malicious page

Step two, open the Kali apache2 service

Enter the command in the console of Kali Linux as follows
Command:/etc/init.d/apache2 start

Open Apache Service

Step three: Open the Ettercap DNS file for editing, the file path under Kali linux2.0 is/etc/ettercap/etter.dns

PS: The added address refers to the address of the Kali Linux.

Modify the DNS resolution file for DNS spoofing

Fourth step: Open the Ettercap tool

Entering commands in the console of Kali Linux
Command:ettercap-g

Turn on the Ettercap graphical tool

Fifth Step: Configure network Information and select an attack target

1. Turn on network sniffing

Turn on network sniffing


2. Select the Kali Linux network card

Select the Kali network card


3. Scan hosts that exist in the current wireless network

Scan host information that exists in a wireless network


4. View the scanned host

Viewing host scan Results


5. Select Target1 as the gateway address and Target2 as the victim's host

Add Gateway and victim IP

Fifth step: Start a DNS spoofing attack

Start attacking

Sixth step, simulate the victim to open any Web page, the browser is displayed in the beginning we set the content of the black page.

Impersonate a victim open any webpage

Summarize
    • Understand how ARP spoofing is implemented under Kali Linux
    • Learn how DNS spoofing is implemented under Kali Linux
    • Understand the causes of public wireless insecurity
    • Should have a sense of security, not in the public network to pay, account login and other sensitive operations.
    • written at the end: For Freedom look outside the world, and it this line, not to go to Google data, finally, Amway an accelerator agent. a red apricot accelerator , go to Google data is the absolute first choice, the connection speed, the use is also convenient. I bought is 99¥ a year, through this link (http://whosmall.com/go/yzhx) registered after the coupon code WH80, lifetime 80 percent , divided down, only 7 yuan per month, special benefits.

      This article tags: Hacker World wifi secure Wireless attack technology public wifi insecure kali+linux

      Turn from SUN's BLOG-focus on Internet knowledge, share the spirit of the Internet!

      Original Address : " beware of public WiFi small white guests take you into the hacker world: Kali Linux under the wireless attack technology "

      Related reading: What git can do, how it differs from SVN in depth

      Related reading: " share some of the most useful, user-friendly, and feature-rich Google Chrome Extensions for developers "

      Related reading: A lot of brief encounter tools or websites that share some of the actual Android development process

      related reading:" I am a G powder, has been concerned about Google, recently Google has some little gestures, probably a lot of people do not understand "

      related reading:" machine learning leads to technological innovation in the field of cognition, so how can the SaaS industry be changed by machine learning?" "

      related reading:"VPS Tutorial Series: DNSMASQ + DNSCrypt + SNI Proxy smooth access to Google configuration tutorial "

      Related reading: useful for programmers: 2017 latest in Google's Hosts file download and summary of the various hosts encountered the problem of the solution and configuration of the detailed

      Related blog:SUN ' S blog -Focus on Internet knowledge and share the spirit of Internet! Go and see:www.whosmall.com

      Original address: http://whosmall.com/?post=460

Beware of the public WiFi small white guests take you into the hacker world: Kali Linux under the wireless attack technology

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.