Netdiscover是一個主動/被動的ARP偵查工具。該工具在不使用DHCP的無線網絡上很是有用。使用Netdiscover工具能夠在網絡上掃描IP地址,ARP偵查工具Netdiscover檢查在線主機或搜索爲它們發送的ARP請求。下面將介紹Netdiscover工具的使用方法。本文選自Kail Linux滲透測試實訓手冊大學霸node
首先查看下Netdiscover工具的幫助信息,執行命令以下所示:express
root@kali :~# netdiscover -h網絡
Netdiscover 0.3-beta7 [Active/passive arp reconnaissance tool]工具
Written by: Jaime Penalba <jpenalbae@gmail.com>測試
Usage: netdiscover [-i device] [-r range | -l file | -p] [-s time] [-n node] [-c count] [-f] [-d] [-S] [-P] [-C]ui
-i device: your network devicespa
-r range: scan a given range instead of auto scan. 192.168.6.0/24,/16,/8.net
-l file: scan the list of ranges contained into the given fileorm
-p passive mode: do not send anything, only sniffip
-F filter: Customize pcap filter expression (default: "arp")
-s time: time to sleep between each arp request (miliseconds)
-n node: last ip octet used for scanning (from 2 to 253)
-c count: number of times to send each arp reques (for nets with packet loss)
-f enable fastmode scan, saves a lot of time, recommended for auto
-d ignore home config files for autoscan and fast mode
-S enable sleep time supression betwen each request (hardcore mode)
�-P print results in a format suitable for parsing by another program
-L in parsable output mode (-P), continue listening after the active scan is completed
If -r, -l or -p are not enabled, netdiscover will scan for common lan addresses.
輸出的信息顯示了Netdiscover的語法格式及可用的參數本文選自Kail Linux滲透測試實訓手冊大學霸。
【實例3-3】使用Netdiscover工具掃描局域網中全部的主機ARP偵查工具Netdiscover。執行命令以下所示:
root@kali :~# netdiscover
執行以上命令後,將顯示以下所示的信息:
Currently scanning: 10.7.99.0/8 | Screen View: Unique Hosts
692 Captured ARP Req/Rep packets, from 3 hosts. Total size: 41520
_____________________________________________________________________________
IP At MAC Address Count Len MAC Vendor
-------------------------------------------------------------------------------------------------------------------------------
192.168.6.102 00:e0:1c:3c:18:79 296 17760 Cradlepoint, Inc
192.168.6.1 14:e6:e4:ac:fb:20 387 23220 Unknown vendor
192.168.6.110 00:0c:29:2e:2b:02 09 540 VMware, Inc.
從輸出的信息中,能夠看到掃描到三臺主機本文選自Kail Linux滲透測試實訓手冊大學霸ARP偵查工具Netdiscover。