LinuxSir.cn,穿越时空的Linuxsir!

 找回密码
 注册
搜索
热搜: shell linux mysql
123
返回列表 发新帖
楼主: lood

请问怎么防御ARP攻击?(我不是网关)

[复制链接]
发表于 2007-6-26 12:39:11 | 显示全部楼层
Post by 64139303
用个扫描器把网段扫一次 看看谁和网关MAC地址相同 就是他了 然后得到他的IP地址 去K他把

根本没有用吧,人家傻啊,拿着自己的ip玩诈骗
回复 支持 反对

使用道具 举报

发表于 2007-6-26 13:17:41 | 显示全部楼层
Post by 64139303
用个扫描器把网段扫一次 看看谁和网关MAC地址相同 就是他了 然后得到他的IP地址 去K他把



前半句能做到,后半句无效。。

因为会看到一堆IP地址都是他的。
回复 支持 反对

使用道具 举报

发表于 2007-6-27 06:33:32 | 显示全部楼层
有谁用过kArp没有? 看起来不错,但是下面的链接好像不管用。另外还有一个叫arpwatch工具也可以参考。http://freequaos.host.sk/arpwatch/

kArp - Linux Kernel Level ARP Hijacking/Spoofing Utility
Darknet spilled these bits on March 23rd 2006 @ 8:25 am

Introduction

kArp is a linux patch that allows one to implement ARP hijacking in the kernel, but control it easily via userland. You may configure, enable and disable kArp via ProcFS or the sysctl mechanism.

kArp is implemented almost on the device driver level. Any ethernet driver (including 802.11 drivers) is supported. The kArp code is lower than the actual ARP code in the network stack, and thus will respond to ARP requests faster than a normal machine running a normal network stack, even if the machine we’re spoofing has a CPU twice as fast as ours!

Functionality

    * ARP Hijacking - Enabling ARP spoofing allows a user to spoof an ARP response to a specific victim host. Due to the low level at which the code exists, our spoofed packet is guaranteed to arrive at the victim’s network stack prior to the response of the machine we’ve impersonated.
    * ARP Hijacking the Impersonated - Enabling this function via arp_send_to_spoofed allows us to spoof the victim’s information to the impersonated machine as well, helping to solidify the MiM attack. However, this functionality may kill the speed of our spoofed frame to the victim, so it isn’t enabled by default.
    * ARP Flooding - Enabling this function via arp_flood causes the kernel to send a flood of random source and destination MAC addresses via a broken ARP frame. On some switches this will fill its internal MAC table, or overflow it. Often, the result of this attack is forcing the switch to fall back to dumb hub mode, allowing us to sniff the wire without a MiM attack.

Warning

    kArp was written to beat the race in responding to an ARP Request from a target (victim) machine. It is *not* meant as an tool to flood a victim with ARP information. This means that some operating systems (MacOSX) that ingest unsolicited ARP responses may still obtain the actual MAC address of the machine we’re impersonating. Linux, however, only accepts the fastest response. If you want to flood a machine with fake ARP responses, use a userland tool.

For now, the URL is:

http://aversion.net/~north/karp/
回复 支持 反对

使用道具 举报

发表于 2007-6-27 06:43:09 | 显示全部楼层
回复 支持 反对

使用道具 举报

您需要登录后才可以回帖 登录 | 注册

本版积分规则

快速回复 返回顶部 返回列表