当前位置:网站首页>Network security -- man in the middle attack penetration test
Network security -- man in the middle attack penetration test
2022-07-24 13:34:00 【Beluga】
Man in the middle attack penetration test
First step , Open the network topology , Start the experimental virtual machine , View the virtual machines separately IP Address :
Kali Linux

Linux

Windows XP

1. Enter the client Windows XP, stay CMD View the local arp Operation of cache table , And take the command used in this operation as Flag Value submission ;

Flag:arp -a
2. On the client side Windows XP Of CMD Clear local from the command line arp Cache table , And take the command used in this operation as Flag Value submission ;

Flag:arp -d
3. Through the infiltration machine Kali Linux Client side Windows XP And target aircraft Linux Conduct man in the middle attack penetration test , Use echo Command to start the infiltration machine Kali Linux The routing and forwarding function of , And take the absolute path of the configuration file as Flag Value submission ;

Flag:/proc/sys/net/ipv4/ip_forward
4. Through the infiltration machine Kali Linux Client side Windows XP And target aircraft Linux Conduct man in the middle attack penetration test , adopt arpspoof Command to client (Windows XP) And target aircraft (Linux) Conduct arp Pollution , And take the parameters that must be used in this operation as Flag Value submission ;

Flag:t
5. After the successful man in the middle penetration attack , Infiltration machine Kali Linux Can listen to the client Windows XP To the target (Linux) Medium login.php The login website user name submitted by the page 、 Password and other information . Using client Windows XP On the table Chrome Browser access Linux Target's Web Site http://Linux Drone aircraft ip/login.php, Use the saved user name , Password direct login , And in Kali Linux Use packet capture software on Wireshark Carry out the bag , Set up Wireshark Filtering rules , Filter all requests by POST Of HTTP Request package , Use the filter expression you want to use as Flag Value submission ;(== Don't put a space before or after the symbol )
First enter the infiltration machine kali On , Use command wireshark Open the packet capture software , Turn on eth0 Network card monitoring

Then enter the client and open Chrome browser , visit http://172.16.1.200/login.php page , User name and password have been automatically filled , Click on Login Log in

After successful login, return to the penetration machine , Use filter rules to filter

Flag:http.request.method==POST
6. The analysis caught POST Request package , And will POST The client in the request content (Windows XP) To the target (Linux) Medium login.php Page submitted admin The user's password is used as Flag Value submission ;

Flag:iNDs1r3Q
边栏推荐
- Chrome plug-in development tutorial
- Atcoder beginer contest 261 f / / tree array
- Modification of EAS login interface
- selenium环境配置和八大元素定位
- Knowledge sharing | sharing some methods to improve the level of enterprise document management
- Sorting method: bubble sorting (use an array to arrange a string of numbers in order (from large to small or from small to large))
- The MySQL select delay scenario corresponds to that all database query statements will be delayed. After the scenario injection, I executed one
- 编写浏览器插件
- Realize a JS lottery?
- vscode配置用户代码片段(包括删除方法)
猜你喜欢
![[paper reading] temporary binding for semi-superior learning](/img/59/846d868cccad238267bd984f085218.png)
[paper reading] temporary binding for semi-superior learning

从云原生到智能化,深度解读行业首个「视频直播技术最佳实践图谱」

Unity UGUI中scroll bar在游戏中启动界面时没有从最上面显示

How to draw Bezier curve and spline curve?

Group intelligence decision-making in an open environment: concepts, challenges and leading technologies

Group knowledge map: distributed knowledge transfer and federated map reasoning

Redis (13) -- on master-slave replication of redis
![[paper reading] mean teachers are better role models](/img/94/f7846023d38c91d803349f43d8d414.png)
[paper reading] mean teachers are better role models

基于群体熵的机器人群体智能汇聚度量

深入浅出边缘云 | 2. 架构
随机推荐
Detailed explanation of odoo JS DoAction
Is there any potential safety hazard for Xiaobai to open an account with Guotai Junan?
Simulate the implementation of the library function memcpy-- copy memory blocks. Understand memory overlap and accurate replication in detail
网络安全——Web信息收集
网络安全——文件上传渗透测试
Overview of multi view learning methods based on canonical correlation analysis
Mongodb uses mongotemplate operations to add, delete, modify, query, page, sort, aggregate (including embedded data), file upload and download
基于ABP实现DDD--实体创建和更新
Can communication protocol (I)
户外广告牌不能“想挂就挂”!广州城管部门加强户外广告安全管理
基于图正则化的贝叶斯宽度学习系统
Usage of swipemenurecyclerview
为什么函数式接口 Comparator 中有 “两个抽象方法”?
Embedded problem troubleshooting methods, network problems, SD card problems, device startup problems, serial port problems, I2C problems, SPI problems, PCIe problems, etc
I realize large top stack with C I
Introduction to single chip microcomputer
C代码规范
Activity start (launchactivity/startactivity)_ (1)_ WMS of flow chart
Summary of embedded network problems (packet loss of network card, unrecognized network card)
Copy of array and array address value