-
20159217《网络攻防实践》第十三周学习总结
20159217《网络攻防实践》之TCP/IP网络协议攻击工具的使用
netwox伪造数据包
- 首先设立监听,使用tcpdump对ip地址实行监听,输入命令sudo tcpdump host 172.168.200.2 -vvv -n
![](https://images2015.cnblogs.com/blog/816775/201606/816775-20160601205226867-1142212278.png)
- 之后伪造源地址为172.168.200.2目的地址为172.168.200.3的数据报文,命令为sudo netwox 36 -C -l 172.168.200.2 -m 172.168.200.3,并监听,取得随机的seq
![](https://images2015.cnblogs.com/blog/816775/201606/816775-20160601205343602-812056447.png)
![](https://images2015.cnblogs.com/blog/816775/201606/816775-20160601205436961-2026342321.png)
- 尝试设定固定的seq,即输入sudo netwox 36 -C -l 172.168.200.2 -m 172.168.200.3 -q 4444444,监听得到
![](https://images2015.cnblogs.com/blog/816775/201606/816775-20160601205652164-2124874162.png)
![](https://images2015.cnblogs.com/blog/816775/201606/816775-20160601205656586-289039438.png)
netwox进行arp欺骗
- 首先获取靶机A、B的ip地址和mac地址,以及攻击机C的ip地址和mac地址
![](https://images2015.cnblogs.com/blog/816775/201606/816775-20160601231827711-1748698174.png)
![](https://images2015.cnblogs.com/blog/816775/201606/816775-20160601231842039-454037066.png)
![](https://images2015.cnblogs.com/blog/816775/201606/816775-20160601232145086-1195986830.png)
![](https://images2015.cnblogs.com/blog/816775/201606/816775-20160601232354367-258554235.png)
![](https://images2015.cnblogs.com/blog/816775/201606/816775-20160601232400883-1966006892.png)
- 用攻击机C来ping A和B,得到其MAC地址,并用arp -a查看arp缓存
![](https://images2015.cnblogs.com/blog/816775/201606/816775-20160601232455836-732236659.png)
![](https://images2015.cnblogs.com/blog/816775/201606/816775-20160601232501992-811822055.png)
![](https://images2015.cnblogs.com/blog/816775/201606/816775-20160601232531149-1636888652.png)
- 用攻击机C打开wireshark进行抓包,并做如下设定
![](https://images2015.cnblogs.com/blog/816775/201606/816775-20160601232607383-628454901.png)
![](https://images2015.cnblogs.com/blog/816775/201606/816775-20160601232824071-1682658458.png)
![](https://images2015.cnblogs.com/blog/816775/201606/816775-20160601232829649-1285745210.png)
![](https://images2015.cnblogs.com/blog/816775/201606/816775-20160601232836164-1542387387.png)
![](https://images2015.cnblogs.com/blog/816775/201606/816775-20160601232840680-1531170520.png)
- 最后查看成果,观察wireshark数据包,对欺骗的过程和最终达到的结果有个更深的认识
![](https://images2015.cnblogs.com/blog/816775/201606/816775-20160601232941289-1242966182.png)
![](https://images2015.cnblogs.com/blog/816775/201606/816775-20160601232955055-12273368.png)
-
相关阅读:
Oracle 分析函数
Oracle 增加修改删除字段
Oracle 重置序列
End2EndIT
Hyperledger Fabric SDK use case 1
云计算中8项核心技术
Cloud
JVM Guide
微信公众平台PHP开发
在Linux系统环境下修改MySQL的root密码
-
原文地址:https://www.cnblogs.com/20159217cbs/p/5540603.html
Copyright © 2020-2023
润新知