今天用cain做個arp攻擊的測試,環境說明:
攻擊機:win10 虛擬機,網絡如下:
靶機:kali虛擬機,網絡如下:
win10上先用cain做個內網掃描:
網關尾號2,靶機尾號130,在這兩者之間做個中間人,監聽雙方往來的流量:
在靶機上執行arp -a,發現攻擊機的MAC和網關的MAC一樣了,說明arp欺騙成功:
靶機瀏覽網頁情況全盤掌握:
隨便找個網頁輸入賬號也能看到:
總結說明:
1、安裝cain時,會要求安裝wincap4.1.3,順着提示操作,又會彈出不兼容的錯誤,我是單獨裝的wincap4.1.3
2、需要勾選DNS后綴(否則網卡地址顯示0.0.0.0,而不是本機的內網地址),如下標紅:
3、最初我實在真實的物理路由器下測試,不論是windows下用cain,還是kali下用arpspoof/driftnet,確實能夠欺騙目標主機,但同時也會讓目標主機斷網,無法正常瀏覽網頁,猜測可能是路由器有攔截;
4、內網抓包驗證arp協議:
- 先從arp緩存表刪除網關的mac地址,同時訪問百度,這時就會先發送arp廣播包,詢問網關的mac地址,再建立三次握手鏈接請求web數據;
- 具體過程:
(1)先查看本機arp緩存:
root@kali:/home/kalix# arp -a
? (192.168.40.2) at 00:50:56:f7:09:97 [ether] on eth0
? (192.168.40.254) at 00:50:56:fb:3b:3a [ether] on eth0
(2)刪除網關的mac地址,同時訪問百度:
root@kali:/home/kalix# tcpdump -nn -i eth0 port 80 or arp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on eth0, link-type EN10MB (Ethernet), capture size 262144 bytes
21:47:43.334886 ARP, Request who-has 192.168.40.2 tell 192.168.40.130, length 28
21:47:43.335056 ARP, Reply 192.168.40.2 is-at 00:50:56:f7:09:97, length 46
21:47:43.379699 IP 192.168.40.130.60790 > 14.215.177.38.80: Flags [S], seq 657379436, win 64240, options [mss 1460,sackOK,TS val 4141369154 ecr 0,nop,wscale 7], length 0
21:47:43.414515 IP 14.215.177.38.80 > 192.168.40.130.60790: Flags [S.], seq 150080013, ack 657379437, win 64240, options [mss 1460], length 0
21:47:43.414626 IP 192.168.40.130.60790 > 14.215.177.38.80: Flags [.], ack 1, win 64240, length 0
21:47:43.414828 IP 192.168.40.130.60790 > 14.215.177.38.80: Flags [P.], seq 1:78, ack 1, win 64240, length 77: HTTP: GET / HTTP/1.1
21:47:43.414964 IP 14.215.177.38.80 > 192.168.40.130.60790: Flags [.], ack 78, win 64240, length 0
21:47:43.451072 IP 14.215.177.38.80 > 192.168.40.130.60790: Flags [P.], seq 1:2782, ack 78, win 64240, length 2781: HTTP: HTTP/1.1 200 OK
21:47:43.451090 IP 192.168.40.130.60790 > 14.215.177.38.80: Flags [.], ack 2782, win 62780, length 0
21:47:43.451754 IP 192.168.40.130.60790 > 14.215.177.38.80: Flags [F.], seq 78, ack 2782, win 62780, length 0
21:47:43.451915 IP 14.215.177.38.80 > 192.168.40.130.60790: Flags [.], ack 79, win 64239, length 0
21:47:43.486490 IP 14.215.177.38.80 > 192.168.40.130.60790: Flags [FP.], seq 2782, ack 79, win 64239, length 0
21:47:43.486530 IP 192.168.40.130.60790 > 14.215.177.38.80: Flags [.], ack 2783, win 62780, length 0