用2020Kali的时候发现没有ARPspoof
然后老是要百度Kali的源,而且网上的也是各种混杂。
就顺便2个问题一起记录下。
Kali源(官方 + 网易)
#kali 官方源
deb http://http.kali.org/kali kali-rolling main non-free contrib
deb-src http://http.kali.org/kali kali-rolling main non-free contrib
# 网易源
deb http://mirrors.163.com/debian/ stretch main non-free contrib
deb http://mirrors.163.com/debian/ stretch-updates main non-free contrib
deb http://mirrors.163.com/debian/ stretch-backports main non-free contrib
deb-src http://mirrors.163.com/debian/ stretch main non-free contrib
deb-src http://mirrors.163.com/debian/ stretch-updates main non-free contrib
deb-src http://mirrors.163.com/debian/ stretch-backports main non-free contrib
deb http://mirrors.163.com/debian-security/ stretch/updates main non-free contrib
deb-src http://mirrors.163.com/debian-security/ stretch/updates main non-free contrib
安装ARPSpoof
在安装前先更新下
sudo apt-get update
然后安装ARPSpoof
sudo apt-get install dsniff
然后输入arpspoof出现下面提示就说明安装成功了
接下来实验看看
winxp:192.168.61.133
Kali:192.168.61.145
先看下WinXP原来的arp表,192.168.61.2和192.168.61.145的MAC地址是不一样的
然后在Kali上使用arpspoof进行欺骗
# -i 指定网卡
# -t 受害主机
# -r 伪造的主机IP
sudo arpspoof -i eth0 -t 192.168.61.133 -r 192.168.61.2
再次看下Winxp的arp表,可以看到192.168.61.2的MAC地址和192.168.61.145是一样的