ARP spoofing and anti-spoofing

What is ARP? ARP (address resolution protocol) is called Address Resolution Protocol in Chinese, and its function is to resolve the MAC address through the IP address. Specific explanation: each network card has an ARP table, each row in the table stores the target IP address and MAC address, the first column in the table […]

Principle and Realization of ARP Spoofing

Directory 1. The principle of ARP protocol 2. Message fields and field meanings of ARP protocol 3. ARP attack and spoofing 1. ARP attack principle 2. ARP spoofing principle 4. ARP attack and deception demonstration 5. Windows uses the ARP command 6. ARP attack and spoofing investigation and defense 1. ARP attack investigation 2. ARP […]

DNS Spoofing and Phishing Sites

Experiment background Phishers use social engineering to lure victims to obtain private information such as their names, ages, email accounts, and even bank card passwords without authorization. Fishing is often combined with social engineering to induce, and social engineering is a hacker’s internal skills, whether it can be used flexibly can reflect a hacker’s personal […]

[Solved] WARNING: POSSIBLE DNS SPOOFING DETECTED! Solution

`@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @@@@@@@@@@@ @WARNING: POSSIBLE DNS SPOOFING DETECTED! @ @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @@@@@@@@@@ The ECDSA host key for slave1 has changed, and the key for the corresponding IP address 172.16.40.209 is unknown. This could either mean that DNS SPOOFING is happening or the IP address for the host and its host key have changed at the same time. […]