zoukankan      html  css  js  c++  java
  • Ethical Hacking

    Post Connection Attacks

    Sophisticated attacks that can be used after connecting to the target AP.

    Gathering Information

    Now that we are connected to a specific AP, we can gather more detailed info about the clients connected to this AP. There is a number of programs that can be used to do this, we shall talk about 3 programs starting with the simplest and quickest one.

    · Netdiscover

    Netdiscover is a program that can be used to discover the connected clients to our current network, it's very quick but it does not show detailed information about the clients: IP, MAC address and some times the hardware manufacturer for the client's wireless card.

    netdiscover -i [INTERFACE] -r [RANGE]

    Netdiscover 0.5.1 [Active/passive ARP reconnaissance tool]
    Written by: Jaime Penalba <jpenalbae@gmail.com>

    Usage: netdiscover [-i device] [-r range | -l file | -p] [-m file] [-F filter] [-s time] [-c count] [-n node] [-dfPLNS]
    -i device: your network device
    -r range: scan a given range instead of auto scan. 192.168.6.0/24,/16,/8
    -l file: scan the list of ranges contained into the given file
    -p passive mode: do not send anything, only sniff
    -m file: scan a list of known MACs and host names
    -F filter: customize pcap filter expression (default: "arp")
    -s time: time to sleep between each ARP request (milliseconds)
    -c count: number of times to send each ARP request (for nets with packet loss)
    -n node: last source IP octet used for scanning (from 2 to 253)
    -d ignore home config files for autoscan and fast mode
    -f enable fastmode scan, saves a lot of time, recommended for auto
    -P print results in a format suitable for parsing by another program and stop after active scan
    -L similar to -P but continue listening after the active scan is completed
    -N Do not print header. Only valid when -P or -L is enabled.
    -S enable sleep time suppression between each request (hardcore mode)

    If -r, -l or -p are not enabled, netdiscover will scan for common LAN addresses.

     · Autoscan

    Autoscan is another program that can be used to discover the connected clients to our current network, it's not as quick as netdiscover, but it shows more detailed information about the connected devices and it has a graphical user interface.

    Download autoscan from: https://sourceforge.net/projects/autoscan/files/AutoScan/autoscan-network%201.50/AutoScan-Network-1.50.pkg.zip/download

    -> Install autoscan

     ->Chose the installation directory

     ->Complete the installation and set the Network Wizard.

     

     

     

    相信未来 - 该面对的绝不逃避,该执著的永不怨悔,该舍弃的不再留念,该珍惜的好好把握。
  • 相关阅读:
    任意指定一个key获取该key所处在哪个node节点
    记一次mysql的问题处理@20181225
    Vue 自定义校验规则
    Vue 渲染状态标签
    Vue Token拦截跳转
    vue 组件路由问题
    vue npm运行报错
    Vue复习(一)
    从客户端中检测到有潜在危险的 Request.Form
    EF Core for MySql踩坑(二)
  • 原文地址:https://www.cnblogs.com/keepmoving1113/p/11931124.html
Copyright © 2011-2022 走看看