No smoke war in LAN (memoirs)

Source: Internet
Author: User

There is no smoke war in the LAN. This article is a memoir. Now there are no people attacking me in the LAN.

The conditions for living in Beijing are really not the same. A small room doesn't matter and N people share a 2 m network cable. For me, this downloading madman is about to crash, after the landlord leaves, quickly plug in the network cable for the Internet bubble, and the Internet is no longer available for many days. I couldn't open the webpage two minutes later. I suddenly woke up about a minute later. I went there. Someone called P2P. Well, I'll play with you, change the IP address and install the shadow arpfirewall.
 

After all the settings, I continued to access the Internet normally. A few minutes later, the arpfirewall went crazy and reported an alarm, but I didn't capture the culprit. I started the thunder Lightning pilot to download things. It is estimated that the P2P game would crash, after a while, the source of the attack will be 192.168.3.9. Hi, Buddy, I will not provoke you to provoke me and copy CnCerT. net. SKiller sets thread 60 and tells him to disconnect the network first (here 192.168.3.9 is not online, we will use 108 for demonstration)

After a while, I was not addicted. I copied the CAIN and began to sniff him. As a result, I caught only the password, and the username was a bunch of garbled characters, after sniffing for a night, I 've been walking online with true love. I don't know any other websites. How can I play with him? I can see MaxHijack in the Toolkit. It is very domineering to take a look at it,

, Instructions for use:
1. Set Nic, gateway IP, and local IP
2. downlink hijacking: for example, if the host is 192.168.3.3 and the target is 192.168.3.4 of the same subnet, code will be inserted to access any webpage at 192.168.3.4.
3. Uplink hijacking: if the host is 220.223.222.221 and the target is 220.223.222.225 in the same subnet, any client accessing 220.223.222.225 will be inserted with code.
4. Proxy: the destination MAC address of the data packet used for CAM Spoofing
5. Passive recovery CAM: Wait for the switch to recover the CAM table by itself (not recommended)
6. HTTP injection: Enable code injection.
7. The control bar on the right shows the packet sending frequency of hijacking.
8. the status bar at the bottom is: Status proxy IP/MAC target IP packet sending frequency Nic Load
Note: Install winpcap and. net 2.0 on your own.
This software cannot be used for illegal purposes! Otherwise, the consequences are at your own risk and are irrelevant to the CCTEAM.

I'm so excited when I see the second article. Please try it and give him a window.
 

It appears 6 times after several seconds and stops changing text.

It took about a few minutes before the attack was successful. Then the ARP attack to me was stopped. I guess the Buddy was scared. Hey hey, the next day he repaired the guy with the 108 IP address, now, anyone who downloads the ARP packet will be killed. Since then, the website has not been opened and cannot be opened.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.