prinaha(prinaha).docVIP

  1. 1、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。。
  2. 2、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载
  3. 3、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
  4. 4、该文档为VIP文档,如果想要下载,成为VIP会员后,下载免费。
  5. 5、成为VIP后,下载本文档将扣除1次下载权益。下载后,不支持退款、换文档。如有疑问请联系我们
  6. 6、成为VIP后,您将拥有八大权益,权益包括:VIP文档下载权益、阅读免打扰、文档格式转换、高级专利检索、专属身份标志、高级客服、多端互通、版权登记。
  7. 7、VIP文档为合作方或网友上传,每下载1次, 网站将根据用户上传文档的质量评分、类型等,对文档贡献者给予高额补贴、流量扶持。如果你也想贡献VIP文档。上传文档
查看更多
prinaha(prinaha)

prinaha(prinaha) ULA0201 ARP A TCP/IP B [application layer] [data] [transport layer] [data] [port] [network layer] [data] [IP] [data link layer] [data] [IP] [MAC] [MAC] HWaddr 00:E0:4C:39:61:54 AB [network layer] To access BIP, we must first know BMAC. ARP 1, first check the ARP buffer pool, if you have, if not, then broadcast (range LAN exchange). 2, A-IP asked: May I ask who is BIP, please tell AIP. 3, BIP: Check whether A - IP has MAC (CACHE) and build cache (ARP pool). RPM -ivh wireshark-* libsmi-0.4.5-2.el5.i386.rpm The RealtekS_39:61:54 Elitegro_72:89:b7 ARP Who has 32 Tell 34 Elitegro_72:89:b7 RealtekS_39:61:54 ARP 32 is at 00:19:21:72:89:b7 Bedroom is often malicious speed limit: Gateway GW_IP GW_MAC A_IP, B_IP, C_IP (destruction) (GW_ip, GW_MAC) to send the packet, constantly refresh the ARP pool. Black finish (GW_IP, -C_MAC) Solve: Fixed IPMAC ARP -s 08 00:B0:C4:01:28:D4 Multiple stabilization: 1. Collect MAC and IP Nmap -sP /24 2, cat /etc/ethers 00:1F:D0:C3:2B:2A 3, ARP -f ARP -f saves rc.local Attack simulation 1. Prepare the gateway, configure the inside and outside IP on the gateway. 2, A client, attack machine, monitor ARP address pool change Of. - Watch - N 1, ARP, -n 3, B client, masquerading gateway. (open firewall speed limit) - - iptables - A FORW ARD - s A_ip - M limit - limit 10/m - J ACCEPT - - iptables - A FORW ARD - s A_ip - J DROP 4, C clients, attack machines, listening packets. - - arpattack - t arpdeceive - I eth0 - O A_ip - a GW_ip - S B_ip - tcpdump -nn Normal: GW_IP | \ \ A_IP B_IP C_IP After being attacked: GW_IP \ \ A_IP B_IP C_IP GW_IP:08 00:B0:C4:01:28:D4 B_IP:23 00:1F:C6:76:26:26 A_IP:38 00:23:54:6A:18:C5 C_IP:34 00:E0:4C:39:61:54 data link layer Ether (Ethernet) PC -PPP- cat 56kbps - Internet - answer - pass - network PPP PPPoE Ethernet PC (NIC) - RJ45 ADSL cat PPPOEServer: Characteristic: Application: Rp-pppoe-3.5-32.1.i386.rpm Ppp-2.4.4-2.el5.i386.rpm /etc/ppp/ Chap-secrets No password transfer Pap-secrets: Transfer user nam

您可能关注的文档

文档评论(0)

f8r9t5c + 关注
实名认证
文档贡献者

该用户很懒,什么也没介绍

版权声明书
用户编号:8000054077000003

1亿VIP精品文档

相关文档