Network information security (two)-ARP attack experiment demonstration (how to gracefully cut off the network of others)

Hello everyone!
I’m Xiao Huang, I’m glad to meet you again!
The update today is:

  • Network information security (2)-ARP attack experiment demonstration.

  • Past retrieval: program design study notes-catalog

  • This experiment is only suitable for learning and testing, illegal operations are strictly prohibited! ! !

  • Special thanks to Mr. Xipu Sunshine Guo Menghui for his help and guidance.


Creation time : October 4, 2020
Software version : VMware® Workstation 16 Pro (16.0.0)


1. Principle of ARP attack experiment:

  1. Principle : Use ARP protocol (Address Resolution Protocol) loopholes.
    Insert picture description here
  2. What to parse? : Correspondence between IP address and MAC address.
  3. When two computers want to connect, host A will send an ARP require request (ARP request packet) to request the MAC address of host B, and host B will send an ARP reply response packet (including host B’s MAC address)

Insert picture description here

  • ARP spoofing can also be called a man-in-the-middle attack.

Insert picture description here

  1. Normally, hosts A and B communicate through a switch, and the switch records the MAC addresses of hosts A and Bd. Hacker didn't know.
  2. Hacker can pretend to be host B, like host A sending a MAC reply (using the IP address of host B), telling host A that I am host B and telling host A my MAC address (host A records the corresponding IP address of host B) The MAC address is modified)
  3. In this way, host A is connected to Hcaker. Hacker can choose to stop or choose to transmit data to host B, so that you can choose to monitor the direct communication between host A and host B.

2. ARP attack experiment demonstration:


Preparation conditions :

  1. The use of virtual machines.
  2. Operation of Kali system.
  3. Your computer needs to be connected to this network.

Insert picture description here

2.1 Configure the virtual machine to connect to the physical network:

Insert picture description here
Insert picture description here
Insert picture description here

Insert picture description here

  • Because you want the virtual machine to a physical network connection up, external links virtual machine needs to be turned into bridge mode so as to use the virtual reality world of computer machine tool.
  • The bridge mode to connect to your wireless card above.
  • Click OK .

Insert picture description here
Insert picture description here

  • Open terminal

Insert picture description here

2.2 Test the connectivity of the Kali system of the virtual machine with the outside world:

  • Enter ifconge in the terminal : view the IP address and MAC address of the current network card

Insert picture description here Insert picture description here Insert picture description here

  • Test if it works: ping the IP address

Insert picture description here

2.3 Use the tool to scan the target address or directly obtain the target address:

  • Scan the IP address of your network segment
  • Input: nmap -v -sn network segment/24

Insert picture description here

2.4 Launch an attack on the target and verify the effect:

  • Input: arpspoof -i eth0 -t 192.168.3.15 192.168.3.1

  • Explanation : arpspoof -i (representing the interface that initiated the attack) eth0 -t (representing the target of the attack) 192.168.3.15 (example: the IP of the host being attacked) 192.168.3.1 (example: the router network gateway address)

  • Check the gateway address of the current host connection: ipconfig (enter win terminal in administrator mode)

Insert picture description here

  • Launch an attack:

Insert picture description here

  • Successful hijacking:

Insert picture description here

3 Supplementary explanation of the problems encountered:

3.1 How to solve the ifconfig command not found

Insert picture description here

  • Open Kali's root account :
  • Open the terminal: enter sudo passwd
  • Enter: user's password.
  • Enter: root's new password.
  • Type: su into root and verify.

Insert picture description here

  • When these are displayed, you enter the root account

Insert picture description here

  • Input: id so you can see the root authority group

Insert picture description here

3.2 Enter the root user to update the program:

  • Input: apt-get update to update the software list
  • Input: apt-get upgrade to update the software

Insert picture description here

  • Input: apt-get install XXX This is the download software xxxx
  • Input: apt-get install gobuster (example)

Insert picture description here


Friends passing by, if you think you can learn something , please give a thumbs up and let's go. Welcome to the big guys passing by to comment, correct mistakes, and welcome friends who have questions to comment, leave messages, and send private messages.

The attention of every small partner is my motivation to update my blog! ! !
Please search WeChat for [ Zaixiaxiaohuang ] article updates will be read as soon as possible!
Insert picture description here

Grasp the present, look to the future, come on!


Due to the limited level, there will inevitably be some shortcomings in the writing. I urge everyone to take your advice!

Guess you like

Origin blog.csdn.net/weixin_44519789/article/details/108923155