會員 | ARP攻擊是否會造成IP重複? 區網內某一台電腦一直出現IP重複的訊息!!改了IP不到1分鐘又會出現該訊息! 不曉得ARP的攻擊是否會有這樣的情形?或是硬體的問題? 若是ARP攻擊要如何找出發出攻擊的PC? GATEWAY:192.168.0.1 (IP 分享器) 子網路遮罩:255.255.255.0 DNS:168.95.1.1 網內約10台電腦,IP分享器沒開DHCP,全部手動打192.168.0.XX 另外只要那台電腦一關,就會有另外一台出現IP重複訊息,改了一樣沒用.... |
回覆 |
風中的羽翼 | 回覆: ARP攻擊是否會造成IP重複? 試試 WinArpAttacker 英文 readme.rxt 摘要.... 1.3 Detect -. What is the most important function, it can detect almost all attacking actions metioned as above as well as host status. the event WinArpAttacker can detect is listed as following: SrcMac_Mismath - Host sent an arp packet, its src_mac doesn't match,so the packet will be ignored. DstMac_Mismath - Host recv an arp packet, its dst_mac doesn't match,so the packet will be ignored. Arp_Scan - Host is scanning the lan by arp request for a hosts list. Arp_Antisniff_Scan - Host is scanning the lan for sniffing host,thus the scanner can know who is sniffing. Host_Online - Host is online now. Host_Modify_IP - Host modified its ip to or added a new IP. Host_Modify_MAC - Host modified its mac address. New_Host - New gost was found. Host_Add_IP - Host added a new ip address. Multi_IP_Host - Host has multi-ip addresses. Multi_Mac_Host - Host has multi-mac addresses. Attack_Flood - Host sends a lot of arp packets to another host ,so the target computer maybe slow down. Attack_Spoof - Host sends special arp packets to sniff the data two targets , so the victims' data exposed. Attack_Spoof_Lan - Host lets all host on the lan believe that it's just a gateway, so the intruder can sniff all hosts' data to the real gateway. Attack_Spoof_Ban_Access - Host told host that host has a inexist mac,so the targets can't communicate with each other. Attack_Spoof_Ban_Access_GW - Host told host that the gateway has a inexist mac, so the target can't access the internet through the gateway. Attack_Spoof_Ban_Access_Lan - Host broadcast host's mac as a inexist mac, so the target can't communicate with all hosts on the lan. Attack_IP_Conflict - Host found another host has same ip as its, so the target would be disturbed by ip conflict messages. Local_Arp_Entry_Change - now WinArpAttacker can watch local arp entry, when a host's mac address in local arp table is changed, WinArpAttacker can report. Local_Arp_Entry_Add - When a mac address of a host is added to local arp table, WinArpAttacker can report. -. It can explain each event which WinArpAttacker detected. -. It can save events to file. 此篇文章於 2006-11-17 10:14 PM 被 lamina 編輯。. |
回覆 |
會員 | 回覆: ARP攻擊是否會造成IP重複? 感謝lamina~這套軟體很不錯^^ 但是小弟用NetCut 2.0去attact網內其他台電腦,在軟體中的ActHost似乎查不到發出攻擊的電腦@@? 他都顯示0.0.0.0 這樣來說就只能從ArpSQ的流量來猜測攻擊的電腦了嗎? |
回覆 |
www.ublink.org | 回覆: ARP攻擊是否會造成IP重複? 最簡單的方法 拔線插線 !! |
回覆 |
|
XML | RSS 2.0 | RSS |
本論壇所有文章僅代表留言者個人意見,並不代表本站之立場,討論區以「即時留言」方式運作,故無法完全監察所有即時留言,若您發現文章可能有異議,請 email :[email protected] 處理。