Cain Tool ARP Spoofing attack

Source: Internet
Author: User
Tags dns spoofing

Os:win7
Tool: Cain
Http://pan.baidu.com/s/1xq9lW Password: 409z
Network: Native and hacked computer wired router.

Cain is a well-known LAN sniffing tool with rich features.
For example, you can decrypt the wifi password stored locally.


The following attempts to perform ARP spoofing.
Configure the network card in the settings and turn on sniffing and ARP in the toolbar.
Select the upper Sniffer tab and click the plus sign to scan the hosts in the LAN.


Scan three results, the first one is my Tp-link router, the second is the attack computer. The third Apple-named result doesn't know what's going on when there is no Apple device connection, maybe the routing table saved in the router is displayed? The test found that regardless of whether the Apple device is connected or not, the scan results are three of these. The reason remains to be explained by my knowledge of the network.
Select the ARP tab below and click the toolbar plus sign to add the device you want to spoof for ARP. After adding is complete


Poisoning, poison ....

Click on the Passwords tab below to view the captured password.

I landed on the hacked computer with a Chrome browser, and Chrome gave me a warning about douban, and I clicked on.

In Cain, my Douban username and password are displayed in clear text!


This illustrates two issues:
1.ARP spoofing can be found, and chrome gives a warning message.
2. Quite a few websites use plaintext to transfer passwords. A while ago, I saw in the discussion that many large websites in the country, the issue of the plaintext transmission of passwords, is indeed very insecure.

In the attack on the computer multiple times (with the wrong password) login, chrome no longer give a warning, Cain also intercepted these passwords.

But landing QQ space found that QQ is not the plaintext transmission password, Cain intercepted information


It can be seen that the security of QQ is relatively high. But the URL is indeed completely intercepted. A few years ago there are ways to view each other's space and photo albums, what is needed is the other side of the full URL after landing, do not know that this method is not feasible today.




Then I tried the DNS spoofing, but there is a problem, using the spoofed computer to log on to the spoofed Web site will not open the page. Open with IE will prompt an unknown error. Pending research.

Cain Tool ARP Spoofing attack

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.