seedlab
大菠萝侦探
这个作者很懒,什么都没留下…
展开
-
seed lab 2020 Local DNS Attack Report
实验环境:User Machine’s IP : 10.0.2.8Attacker’s IP : 10.0.2.7Local DNS Server : 10.0.2.4Task 1打开/etc/resolvconf/resolv.conf.d/head文件,然后添加将10.0.2.4作为DNS服务器的记录,并重启加载配置使记录生效:$ sudo vim /etc/resolvconf/resolv.conf.d/headnameserver 10.0.2.4$ sudo resolvco原创 2020-11-25 20:08:32 · 2802 阅读 · 1 评论 -
seed lab 2020 packet sniffing and spoofing lab
本实验均使用 python3 scapy 完成本文可能使用到的同时发包和收包的程序如下:1. import subprocess 2. from time import * 3. from sys import * 4. 5. sniffer=subprocess.Popen(['python3','tcp_sniffer.py']) 6. sleep(0.5) 7. sender=subprocess.run(args=['python3','tcp_sender.py'],原创 2020-10-17 20:13:20 · 3892 阅读 · 4 评论