Exploring network attacks: ARP disconnection, ARP spoofing and DNS spoofing experimental analysis

Table of Contents Preface 1. Overview of ARP 1.1 What is ARP 1.2 Basic functions of ARP protocol 1.3 ARP cache table 1.4 Common ARP commands 2. ARP disconnection experiment 3. ARP spoofing experiment 3.1 Pictures intercepted from the intranet 3.2 Obtain HTTP account password 4. DNS spoofing experiment Summarize Hi! I am Filotimo__. Nice […]

Man-in-the-middle attack DNS spoofing

Foreword Some time ago, I learned about man-in-the-middle attacks and wrote an article to record them. Principle introduction What is a man-in-the-middle attack? Man-in-the- MiddleAttack (referred to as “MITM attack”) is an “indirect” intrusion attack. This attack mode uses various technical means to virtually place a computer controlled by the intruder between two communicating computers […]

InveighZero: A C#-based Data Spoofing and MitM Tool

During the HW period, in order to prevent phishing, FreeBuf will cancel all external links of submitted articles from now on. Sorry for the inconvenience caused~ About InveighZero InveighZero is a tool that combines LLMNR/NBNS/mDNS/DNS/DHCPv6 spoofing and man-in-the-middle attacks. The tool is designed to help penetration testing experts and red team researchers find security flaws […]

DNS spoofing for man-in-the-middle attacks

Foreword Some time ago, I learned about man-in-the-middle attacks, and wrote an article to record it. Principle Introduction What is a man-in-the-middle attack? Man-in-the-middle attack (Man-in-the- Middle Attack, referred to as “MITM attack”) is an “indirect” intrusion attack. This attack mode is to place a computer controlled by the intruder virtually between two communicating computers […]

bettercap — ARP spoofing function

Disclaimer: This article is only for study, research and discussion, and you must not do illegal and disciplined things! Hello everyone, let’s talk about arp deception today When two devices communicate within a LAN, they use the ARP protocol to determine each other’s physical address (MAC address). ARP spoofing is a network attack technique that […]

Face related algorithms (Retinaface, yolov5face, yolov7face, Arcface, Face_Angle, Silent_Face_Anti_Spoofing, TensorRT+CUDA)

If you find it useful, you might as well give a Star to support it~ Thank you! Project address (github link) FaceAlgorithm Features Including face detection (Retinaface, yolov5face, yolov7face), face detection and tracking (ByteTracker), face angle calculation (Face_Angle), face correction (Face_Aligner), face recognition (Arcface), mask detection (MaskRecognitiion), age and gender detection (Face_Angle), silent living detection […]

ARP spoofing (network disconnection attack)

Seeing roommates playing games loudly at night? accurate? what to do? ! Learn quickly, cut off the roommate network, and give you a quiet night First introduce the ARP protocol and other related knowledge Cough cough, I simply insert a sentence here, because of the final exam, this paragraph is about the ARP protocol and […]

Use dnschef in kali for DNS spoofing

1. Foreword DNSChef is a highly configurable DNS proxy for penetration testers and malware analysts. It has the ability to finely configure which DNS replies to modify or simply proxy the real response. In order to take advantage of the tool, you must manually configure your DNS servers to point to DNSChef. 2. Execution parameters […]