分类: LINUX
2009-07-31 10:57:55
arp欺骗的原理不多述,基本就是利用发 送假的arp数据包,冒充网关。一般在网上通讯的时候网关的IP和MAC的绑定是放在arp 缓存里面的,假的arp包就会刷新这个缓存,导致本该发送到网关的数据包发到了欺骗 者那里。解决的办法就是静态arp。 |
[root@max ~]# ping 192.168.228.153 PING 192.168.228.153 (192.168.228.153) 56(84) bytes of data. 64 bytes from 192.168.228.153: icmp_seq=1 ttl=64 time=0.397 ms 64 bytes from 192.168.228.153: icmp_seq=2 ttl=64 time=0.428 ms |
[root@max ~]# arp Address HWtype HWaddress Flags Mask Iface 192.168.228.153 ether 00:0A:EB:09:C7:2E C eth0 [root@max ~]# |
[root@max ~]# arp -a > /etc/ethers [root@max ~]# cat /etc/ethers ? (192.168.228.153) at 00:0A:EB:09:C7:2E [ether] on eth0 [root@max ~]# |
[root@max ~]# cat /etc/ethers 192.168.228.153 00:0A:EB:09:C7:2E [root@max ~]# |
[root@max ~]# arp -f [root@max ~]# arp Address HWtype HWaddress Flags Mask Iface 192.168.228.153 ether 00:0A:EB:09:C7:2E CM eth0 [root@max ~]# |