sniffer attack and defense in wireless LAN
-----ettercap+driftnet 1 Experimental requirements and purposes
Understanding the rules and protocols for local area network forwarding data
Understand the principle and operation process of grasping package software
A deeper understanding of the protocols for data transmission in the network 2 experimental principles and background knowledge 2.1 Grasping package software and analysis software
There a
Driftnet is a simple and easy-to-use image capture tool that makes it easy to grab pictures in a network packet. The tool can capture real-time and offline data in a given packet, which is a picture, of course, in Kali.In one of my previous blog post "Kali WiFi fishing hotspot" in the use of a bit, now do a simple summary, is a memo target.syntax : driftnet [Options] [Filter code]Main parameters:-B beeps wh
arpspoof+driftnet+ ARP spoofing simple picture crawlDriftnet is a simple and easy-to-use image capture tool that makes it easy to grab pictures in a network packet. The tool can capture real-time and off-line images in a specified packetEnvironment受害ip:192.168.228.130攻击ip:192.168.228.129网关:192.168.228.2Conditions1,开启或关闭IP转发2,向被攻击机器发送arp欺骗数据包,冒充网关3,向网关发送arp数据欺骗网关,冒充被攻击机器4,运行driftnet截取图片Turn on the IP forward
Network Image Sniffer tool driftnet image is an important content of network data transmission. Kali Linux has built-in a dedicated tool drifnet. The tool can support real-time sniffing and offline sniffing. It can extract data from the data stream from the most commonly used image formats of the network, JPEG and GIF, and save them for analysis by penetration testers. At the same time, it can extract MPEG sound data and play it.Network Image Sniffer
Vyatta, the APT source is updated first.Then use Apt-get install Driftnet.You can filter the pictures that pass through the network port.But there is a bug, filtering is not complete, large-size images are not filtered.Driftnet-i eth1-a-d/home/vyatta/workspace/driftsnif-x 20000101 >/dev/null Save the picture locally instead of outputting it to the screen.As a result, there may be many small, useless photos that are removed using the following command:Find./-size-12k | Xargs RM-RFLinux Photo Filt
://192.168 \. 6.1:1900/IPC http/1.1 "--"-"" microsoft-windows/6.1 upnp/1.0 "192.168.6.106--[16/jul/2014:13:12:37 +0800]" POST http:/ /192.168\. 6.1:1900/IFC http/1.1 "--"-"" microsoft-windows/6.1 upnp/1.0 "The above output information shows the target host to access the Internet information.(4) Users can also use the Driftnet tool to capture images viewed by the target system. The execution commands are as follows:[emailprotected]:~#
/ipv4/ip_forwardin Progress (ARP spoofing) arpspoof-i eth0-t 192.168.1.5 192.168.1.1Target can surf the internetUse [Email protected]:~# driftnet-i eth0 tool to view the picture information target drone viewedOptions :-H displays this help message. -V detailed operation. b beep when a new image is captured . -I interface Select the interface to listen to ( default : allinterface ) . -F file instead of listener interface, read capture packets from the
the Kismet website (http://www.kismetwireless.net/), Kismet is a complete wireless network detection, sniffing and intrusion detection tool. This free tool allows you to scan wireless networks, perform real-time WEP decoding, and even tell you the IP range used in this network. Kismet will tell you which (if yes) encryption method is used on the network, how many customers are connected to each network, and display Access Point devices that keep the default factory configuration. If you have so
ARP spoofing technology-obtain images of the Intranet destination IP addresses accessing the QQ space
The article is for study only. do not violate the law.
Requirement: Virtual Machine Kali linux SystemCommand "ip query command: ifconfigecho write command is not explicitly driftnet get local nic" Nic to view the image information of the NIC, for example, target ip Address: 192.168.1.100 Gateway: 192.168.1.1Spoofing statement "Arpspoof-I nic-t targe
yersinia instead.0 × 03 install dhcp server udhcpd# Apt-get install udhcpdModify the configuration file.# Vim/etc/udhcpd. conf0 × 04 start the DHCP serverService udhcpd startThen start another Kali host as the target. Because the normal DHCP server has no available IP Address resources, the new Intranet host will use the IP address allocated by the attacker's DHCP server.0 × 05 capture the Target Image and enable driftnet on the target host.#
can also use yersinia instead.
0 × 03 install dhcp server udhcpd
#apt-getinstalludhcpd
Modify the configuration file.
#vim/etc/udhcpd.conf
0 × 04 start the DHCP server
serviceudhcpdstart
Then start another Kali host as the target. Because the normal DHCP server has no available IP Address resources, the new Intranet host will use the IP address allocated by the attacker's DHCP server.
0 × 05 capture the Target ImageEnable driftnet on the atta
. You can also use yersinia instead.
0 × 03 install dhcp server udhcpd
# Apt-get install udhcpd
Modify the configuration file.
# Vim/etc/udhcpd. conf
0 × 04 start the DHCP server
Service udhcpd start
Then start another Kali host as the target. Because the normal DHCP server has no available IP Address resources, the new Intranet host will use the IP address allocated by the attacker's DHCP server.
0 × 05 capture the Target Image
Enable driftnet o
Dhcpstarv, you can also use Yersinia instead0x03 Installing the DHCP server UDHCPD# Apt-get Install UDHCPDThen modify the configuration file# Vim /etc/udhcpd. conf 0x04 Start the DHCP serverService UDHCPD StartThen start another Kali machine as the target target drone, because the normal DHCP server has no assignable IP resources, the new intranet host will use the IP assigned by the attacker's DHCP server0x05 Grab the image of the target target drone on the attacking host to open
intercepted:
163 email account password:
2. Exploitation
Ettercap + driftnetIntercept the image data stream of the target host
Open a terminal window and run the root permission:
Ettercap-I wlan0-TQ-M ARP: Remote/192.168.1.107 // 192.168.1.1/# ARP spoofing on the target hostCreate a terminal window and execute:
Driftnet-I wlan0 # Listen to wlan0
(Sorry, the pixel of the backup mobile phone is too bad.) attacked host interface: At this time, the at
Pic by Baidu 0x ╮(╯▽╰)╭Please shout me the evil title party hahaha haha0x 01 Here's the chase.Virtual machine (Kali) does not support the internal network card, fortunately I have the artifact, plug in my rt8187l, began to startReference: zone.wooyun.org/content/2562Let's look at the attack test. Show Hotspot Link Information Mobile link counterfeit hotspot (Fake-anka) Mobile Web browsing Computer-based images intercepted by the
Bored to play, do not do some bad things yo ~ ~ Online There are some articles about Kali Linux, on the actual combat. Kali is used by Debian.If you are in the same wifi as the goddess.IP ScannerKali virtual machine under the link external USB wireless card, virtual machine step support built-in wireless network cardTerminal input echo 1 >/proc/sys/net/ipv4/ip_forward IP forwarding to ensure the Goddess's normal internet accessTerminal input ZenmapThen open a terminal, enter ETTERCAP-GSelect Nic
likelihood of 90% is the SA user or SA permissions. The following evil ideas come, intercept and modify query statements, create a new database management account, and then use the tool directly connected up, then do not control the database, after the control of the database is there a chance to control the server? Try it and you'll know.1.3 Test man-in-the-middle attackThere's no need for a middleman attack on this machine, is there? But I still very much want to use Ettercap's filter and rep
describes these security evaluation tools and uses them to quickly and easily test the system.Rich toolsIn addition to making the system more secure, there are also some tools that can be used to determine the system's ability to withstand various attacks, such:By using firewall tools such as blockall, You can restrict all TCP communication. By using tools such as floppyfw, You can implement a firewall in a floppy disk.Labrea is a "stick honeypot" that can limit worms and Port Scan attacks to e
1. Local Area network image sniffingTool ArpspoofArpspoof-i eth0-t 192.1681.10 (NIC destination address) 192.168.1.1 LAN Gateway, if you can use the LAN Scan tool in Windows Advanced IP ScannerLinux scan LAN on-line host FPING-ASG 192.168.1.0/24Cheating can not be the other side off the network, using traffic forwarding echo 1 >/proc/sys/net/ipv4/ip_forwardCheck whether the cat Proc/sys/sys/net/ipv4/ip_forward was executed successfullyGet a picture of a native Nic
ARP Spoofing technology-Get intranet destination IP Access pictures!Summary: The ARP (Address Resolution Protocol, addresses resolution Protocol) is a network layer located in the TCP/IP protocol stack, responsible for resolving an IP address to the corresponding MAC address.Requirements:Virtual machinesKali Linux SystemCommand "Check IP command: ifconfigEcho Write command is not echo driftnet get native network card "network card" view network card p
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.