<p class="MsoNormal" style="margin-top: 0cm; margin-right: 0cm; margin-bottom: 0pt; margin-left: 0cm; "><span style="font-size: 16pt; font-family: 宋体; "><strong><font face="Arial Black">无线<font face="Verdana">PTP VPN</font> 攻击,</font><font face="Verdana">VPN Attack<font color="#ff0000">第一弹!</font></font></strong></span></p><p></p><p><b><span style="font-size: 12pt; color: red; font-family: 宋体; ">作者:</span></b><b><span style="font-size: 14pt; font-family: 宋体; ">杨</span></b><b><span style="font-size: 14pt; font-family: 宋体; ">哲</span></b><b><span lang="EN-US" style="font-size: 14pt; font-family: Verdana; "> / Christopher Yang </span></b><b><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">[</span></b><b><span lang="EN-US" style="font-size: 14pt; color: rgb(51, 102, 255); font-family: Verdana; ">ZerOne</span></b><b><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">]</span></b></p><p><b><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; "></span></b><span><strong>(</strong>欢迎转载,转载时请注明作者及出处)</span></p><span><p class="MsoNormal" style="margin-top: 0cm; margin-right: 0cm; margin-bottom: 0pt; margin-left: 0cm; text-indent: 24pt; "><span style="font-size: 12pt; font-family: 宋体; ">大多数管理员及用户对于</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">VPN</span><span style="font-size: 12pt; font-family: 宋体; ">的看法都是:</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">VPN</span><span style="font-size: 12pt; font-family: 宋体; ">环境已经属于高级别安全防护,足以保证企业内部信息通信的安全与稳定。那么,事实真的是这样么?</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">VPN</span><span style="font-size: 12pt; font-family: 宋体; ">真的是如此无敌么?下面笔者就带大家来揭开</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">VPN</span><span style="font-size: 12pt; font-family: 宋体; ">薄弱的面纱,看看黑客们是如何进行</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">VPN</span><span style="font-size: 12pt; font-family: 宋体; ">攻击的。</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; "></span></p><p></p></span><p></p><p></p><p></p><p><span style="font-size: 12pt; font-family: 宋体; "> 首先要强调的是,</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">VPN</span><span style="font-size: 12pt; font-family: 宋体; ">类型有很多分类,但对于大多数中小型企业,为了便于工作及部署,基本都是采用</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">PTP</span><span style="font-size: 12pt; font-family: 宋体; ">及强化的</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">IPSec VPN</span><span style="font-size: 12pt; font-family: 宋体; ">,至于大型企业及分支众多的分店型企业,则较多使用</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">SSL VPN</span><span style="font-size: 12pt; font-family: 宋体; ">。而针对</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">VPN</span><span style="font-size: 12pt; font-family: 宋体; ">的恶意攻击,常见的有中间人攻击、</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">D.O.S</span><span style="font-size: 12pt; font-family: 宋体; ">攻击等。作为无线领域的延伸,无线</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">VPN</span><span style="font-size: 12pt; font-family: 宋体; ">在带来便捷的同时,也面临着和有线网络</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">VPN</span><span style="font-size: 12pt; font-family: 宋体; ">一样的威胁。下面我就以攻击Windows 2003环境的PPTP VPN为例,下次给大家带来IPSec VPN 的攻击。</span><span style="font-size: 12pt; font-family: 宋体; "><br/></span></p><p class="MsoNormal" style="margin-top: 0cm; margin-right: 0cm; margin-bottom: 0pt; margin-left: 0cm; "><b><span lang="EN-US" style="font-size: 14pt; font-family: Verdana; ">1</span></b><b><span style="font-size: 14pt; font-family: 宋体; ">.攻击相关工具介绍</span></b><b><span lang="EN-US" style="font-size: 14pt; font-family: Verdana; "></span></b></p><b><p></p></b><p></p><p></p><p></p><p class="MsoNormal" style="margin-top: 0cm; margin-right: 0cm; margin-bottom: 0pt; margin-left: 0cm; "><b><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">Zenmap<span class="Apple-style-span" style="font-family: Arial; font-size: 14px; font-weight: normal; "><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; "></span></span></span></b></p><p class="MsoNormal" style="margin-top: 0cm; margin-right: 0cm; margin-bottom: 0pt; margin-left: 0cm; "><b><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; "><span class="Apple-style-span" style="font-family: Arial; font-size: 14px; font-weight: normal; "><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">Zenmap</span><font face="Verdana"><span style="font-size: 12pt; font-family: 宋体; ">其实只是</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">nmap</span><span style="font-size: 12pt; font-family: 宋体; ">的图形版本,作为同样免费的工具,</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">zenmap</span><span style="font-size: 12pt; font-family: 宋体; ">提供了很好的界面帮助用户进行</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">nmap</span><span style="font-size: 12pt; font-family: 宋体; ">常见的扫描选项,并能够将结果用不同颜色标识,以便用户查看所需的内容。BackTrack2/3内置为其命令行版。<span class="Apple-style-span" style="font-family: Verdana; font-weight: bold; "></span></span></font></span></span></b></p><p class="MsoNormal" style="margin-top: 0cm; margin-right: 0cm; margin-bottom: 0pt; margin-left: 0cm; "><b><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; "><span class="Apple-style-span" style="font-family: Arial; font-size: 14px; font-weight: normal; "><font face="Verdana"><span style="font-size: 12pt; font-family: 宋体; "><span class="Apple-style-span" style="font-family: Verdana; font-weight: bold; ">Asleap<span class="Apple-style-span" style="font-size: 14px; font-weight: normal; "><span style="font-size: 12pt; font-family: 宋体; "></span></span></span></span></font></span></span></b></p><p class="MsoNormal" style="margin-top: 0cm; margin-right: 0cm; margin-bottom: 0pt; margin-left: 0cm; "><b><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; "><span class="Apple-style-span" style="font-family: Arial; font-size: 14px; font-weight: normal; "><font face="Verdana"><span style="font-size: 12pt; font-family: 宋体; "><span class="Apple-style-span" style="font-family: Verdana; font-weight: bold; "><span class="Apple-style-span" style="font-size: 14px; font-weight: normal; "><span style="font-size: 12pt; font-family: 宋体; ">这是一款用于恢复</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">LEAP</span><span style="font-size: 12pt; font-family: 宋体; ">和</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">PTP</span><span style="font-size: 12pt; font-family: 宋体; ">加密密码的免费工具,其原理主要是基于</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">LEAP</span><span style="font-size: 12pt; font-family: 宋体; ">验证漏洞,但由于</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">PTP</span><span style="font-size: 12pt; font-family: 宋体; ">同样使用了和</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">LEAP</span><span style="font-size: 12pt; font-family: 宋体; ">一样的</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">MSCHAPv2</span><span style="font-size: 12pt; font-family: 宋体; ">加密,所以这款工具也可用于破解</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">PTP</span><span style="font-size: 12pt; font-family: 宋体; ">帐户及密码。有</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">Linux</span><span style="font-size: 12pt; font-family: 宋体; ">和</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">Windows</span><span style="font-size: 12pt; font-family: 宋体; ">两个版本,大家可根据需要选择。BackTrack2/3内置<span class="Apple-style-span" style="font-family: Verdana; font-weight: bold; "></span></span></span></span></span></font></span></span></b></p><p class="MsoNormal" style="margin-top: 0cm; margin-right: 0cm; margin-bottom: 0pt; margin-left: 0cm; "><b><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; "><span class="Apple-style-span" style="font-family: Arial; font-size: 14px; font-weight: normal; "><font face="Verdana"><span style="font-size: 12pt; font-family: 宋体; "><span class="Apple-style-span" style="font-family: Verdana; font-weight: bold; "><span class="Apple-style-span" style="font-size: 14px; font-weight: normal; "><span style="font-size: 12pt; font-family: 宋体; "><span class="Apple-style-span" style="font-family: Verdana; font-weight: bold; ">Ettercap<span class="Apple-style-span" style="font-size: 14px; font-weight: normal; "><span style="font-size: 12pt; font-family: 宋体; "></span></span></span></span></span></span></span></font></span></span></b></p><p class="MsoNormal" style="margin-top: 0cm; margin-right: 0cm; margin-bottom: 0pt; margin-left: 0cm; "><b><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; "><span class="Apple-style-span" style="font-family: Arial; font-size: 14px; font-weight: normal; "><font face="Verdana"><span style="font-size: 12pt; font-family: 宋体; "><span class="Apple-style-span" style="font-family: Verdana; font-weight: bold; "><span class="Apple-style-span" style="font-size: 14px; font-weight: normal; "><span style="font-size: 12pt; font-family: 宋体; "><span class="Apple-style-span" style="font-family: Verdana; font-weight: bold; "><span class="Apple-style-span" style="font-size: 14px; font-weight: normal; "><span style="font-size: 12pt; font-family: 宋体; ">这是一款以太网环境下的网络监视、拦载和记录工具,支持多种主动或被动的协议分析,比如加密相关</span><span style="font-size: 12pt; font-family: 宋体; ">的</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">SSH</span><span style="font-size: 12pt; font-family: 宋体; ">、</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">HTTPS</span><span style="font-size: 12pt; font-family: 宋体; ">等,有数据插入、过滤、保持连接同步等多种功能,也有一个能支持多种嗅探模式的、强大而完整的嗅探套件,支持插件,能够检查网络环境</span><span style="font-size: 12pt; font-family: 宋体; ">是否是交换局域网,并且能使用主动或被动的操作系统指纹识别技术让你了解当前局域网的情况。这款工具也</span><span style="font-size: 12pt; font-family: 宋体; ">有</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">Linux</span><span style="font-size: 12pt; font-family: 宋体; ">和</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">Windows</span><span style="font-size: 12pt; font-family: 宋体; ">两个版本。BackTrack2/3内置。</span></span></span></span></span></span></span></font></span></span></b></p><p class="MsoNormal" style="margin-top: 0cm; margin-right: 0cm; margin-bottom: 0pt; margin-left: 0cm; "><span class="Apple-style-span" style="font-family: 宋体; font-size: 16px; "></span></p><p class="MsoNormal"><b><span lang="EN-US" style="font-size: 14pt; font-family: Verdana; ">2</span></b><b><span style="font-size: 14pt; font-family: 宋体; ">.</span></b><b><span lang="EN-US" style="font-size: 14pt; font-family: Verdana; ">VPN</span></b><b><span style="font-size: 14pt; font-family: 宋体; ">攻击实战步骤<span class="Apple-style-span" style="font-family: Arial; font-size: 14px; font-weight: normal; "><br/>
1 l3 _; V+ b1 u( C </span></span></b></p><p class="MsoNormal"><b><span style="font-size: 12pt; font-family: 宋体; ">步骤</span></b><b><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">1</span></b><span style="font-size: 12pt; font-family: 宋体; ">:<b>扫描并确定</b></span><b><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">VPN</span></b><b><span style="font-size: 12pt; font-family: 宋体; ">服务器目标<span class="Apple-style-span" style="font-family: Arial; font-size: 14px; font-weight: normal; "><br/>
# s" r# r7 o/ J3 m* y) Y </span></span></b></p><p class="MsoNormal" style="text-indent: 24pt; "><span style="font-size: 12pt; font-family: 宋体; ">在对</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">VPN</span><span style="font-size: 12pt; font-family: 宋体; ">设备进行攻击前,需要先对预攻击目标进行确认,这就需要扫描来发现及识别目标。对于最常见的</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">PPTP VPN</span><span style="font-size: 12pt; font-family: 宋体; ">,攻击者常会使用</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">nmap</span><span style="font-size: 12pt; font-family: 宋体; ">这款在命令提示符下工作的扫描器来进行探测。不过,在本书修订时<span class="Apple-style-span" style="font-family: Arial; font-size: 14px; "><span style="font-size: 12pt; font-family: 宋体; ">(嘿嘿,我的书),</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">nmap</span><span style="font-size: 12pt; font-family: 宋体; ">已经有了自己的图形化版本</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">zenmap</span><span style="font-size: 12pt; font-family: 宋体; ">,对于一些习惯使用鼠标的用户,也许是个福音。<span class="Apple-style-span" style="font-family: Arial; font-size: 14px; ">
# g" ]0 u5 d, E Z </span></span></span></span></p><p class="MsoNormal"><span style="font-size: 12pt; font-family: 宋体; ">如下图所示,通过采用</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">Full version Detection Scan</span><span style="font-size: 12pt; font-family: 宋体; ">完整版本探测模式,作为新版本的</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">zenmap</span><span style="font-size: 12pt; font-family: 宋体; ">,成功扫描出目标开放了</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">1723</span><span style="font-size: 12pt; font-family: 宋体; ">端口,此为</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">PPTP VPN</span><span style="font-size: 12pt; font-family: 宋体; ">服务器标准开放端口。在这里可以看到,</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">zenmap</span><span style="font-size: 12pt; font-family: 宋体; ">同时识别出目标操作系统为</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">Windows 2003 </span><span style="font-size: 12pt; font-family: 宋体; ">,以及该系统对应的内部版本号,非常准确。</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; "><op></op></span></p><p class="MsoNormal"><span class="Apple-style-span" style="font-family: 宋体; font-size: 16px; "><span class="Apple-style-span" style="font-family: Verdana; "><span class="Apple-style-span" style="font-family: Arial; font-size: 14px; "></span>
0 u0 ^7 P. H `+ v </span><br/></span></p><p class="MsoNormal"></p><p class="MsoNormal"><b><span style="font-size: 12pt; font-family: 宋体; ">步骤</span></b><b><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">2</span></b><b><span style="font-size: 12pt; font-family: 宋体; ">:准备</span></b><b><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">Asleap<span class="Apple-style-span" style="font-family: 宋体; font-weight: normal; "><span style="font-size: 12pt; font-family: 宋体; "></span></span></span></b></p><p class="MsoNormal"><b><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; "><span class="Apple-style-span" style="font-family: 宋体; font-weight: normal; "><span style="font-size: 12pt; font-family: 宋体; ">对于BackTrack </span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">Linux</span><span style="font-size: 12pt; font-family: 宋体; ">环境的用户,已经内置了Asleap<b><span style="font-size: 12pt; font-family: 宋体; "></span></b></span></span></span></b></p><p class="MsoNormal"><span class="Apple-style-span" style="font-family: 宋体; font-size: 16px; "><span class="Apple-style-span" style="font-family: Arial; font-size: 14px; "></span><br/></span></p><p class="MsoNormal"><span class="Apple-style-span" style="font-family: 宋体; font-size: 16px; font-weight: bold; "></span></p><p class="MsoNormal"><b><span style="font-size: 12pt; font-family: 宋体; ">步骤</span></b><b><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">3</span></b><b><span style="font-size: 12pt; font-family: 宋体; ">:准备</span></b><b><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">ettercap<span class="Apple-style-span" style="font-family: Arial; font-size: 14px; font-weight: normal; "><br/><span style="font-size: 12pt; font-family: 宋体; ">和上面</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">asleap</span><span style="font-size: 12pt; font-family: 宋体; ">的准备工作一样,对于</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">Windows</span><span style="font-size: 12pt; font-family: 宋体; ">或</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">Linux</span><span style="font-size: 12pt; font-family: 宋体; ">环境,安装对应的</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">ettercap</span><span style="font-size: 12pt; font-family: 宋体; ">版本即可,需要说明的是,对于</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">Windows</span><span style="font-size: 12pt; font-family: 宋体; ">环境,在安装</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">ettercap</span><span style="font-size: 12pt; font-family: 宋体; ">前,应当先安装</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">WinPcap</span><span style="font-size: 12pt; font-family: 宋体; ">驱动,该驱动可支持网卡模式切换为混杂模式,以便进行中间人攻击所必需的嗅探及监听。<span class="Apple-style-span" style="font-family: Arial; font-size: 14px; ">7 T: P, E' p- w7 y
</span></span></span></span></b></p><p class="MsoNormal" style="text-indent: 24pt; "><span style="font-size: 12pt; font-family: 宋体; ">安装完毕后,就可以打开</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">ettercap</span><span style="font-size: 12pt; font-family: 宋体; ">,打开后先指定该工具工作的网卡,对于</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">Linux</span><span style="font-size: 12pt; font-family: 宋体; ">环境,这里选择为</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">eth0</span><span style="font-size: 12pt; font-family: 宋体; ">。对于</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">Windows</span><span style="font-size: 12pt; font-family: 宋体; ">环境,则选择当前连接外网的网卡。<span class="Apple-style-span" style="font-family: Arial; font-size: 14px; ">
7 X( D$ H7 O) y/ X/ D- r* t7 L </span></span></p><p class="MsoNormal" style="text-indent: 24pt; "><span style="font-size: 12pt; font-family: 宋体; ">下图为</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">Linux</span><span style="font-size: 12pt; font-family: 宋体; ">下在</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">ettercap</span><span style="font-size: 12pt; font-family: 宋体; ">里指定工作网卡</span></p><p class="MsoNormal" style="text-indent: 24pt; "><span class="Apple-style-span" style="font-family: 宋体; font-size: 16px; "><span class="Apple-style-span" style="font-family: Arial; font-size: 14px; "></span><br/></span></p><p class="MsoNormal" style="text-indent: 24pt; "></p><p class="MsoNormal"><b><span style="font-size: 12pt; font-family: 宋体; ">步骤</span></b><b><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">4</span></b><span style="font-size: 12pt; font-family: 宋体; ">:设定完毕工作网卡,会出现载入界面,此时</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">ettercap</span><span style="font-size: 12pt; font-family: 宋体; ">会将监听及攻击模块依次载入。</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; "><op></op></span></p><p class="MsoNormal"></p><p class="MsoNormal"><b><span style="font-size: 12pt; font-family: 宋体; ">步骤</span></b><b><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">5</span></b><b><span style="font-size: 12pt; font-family: 宋体; ">:</span></b><span style="font-size: 12pt; font-family: 宋体; ">载入完毕后,需要打开</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">Hosts</span><span style="font-size: 12pt; font-family: 宋体; ">栏</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">—Scan hosts</span><span style="font-size: 12pt; font-family: 宋体; ">选项,进行扫描网段内开启主机的步骤。经过很短时间的等待,在扫描结果中,</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">ettercap</span><span style="font-size: 12pt; font-family: 宋体; ">会列出所有该网段内开启主机</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">IP</span><span style="font-size: 12pt; font-family: 宋体; ">及对应</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">MAC</span><span style="font-size: 12pt; font-family: 宋体; ">的列表,如下图,可以在</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">Host List</span><span style="font-size: 12pt; font-family: 宋体; ">里查看该主机列表。</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; "><op></op></span></p><p class="MsoNormal"><span class="Apple-style-span" style="font-family: 宋体; font-size: 16px; "><span class="Apple-style-span" style="font-family: Arial; font-size: 14px; "></span><br/></span></p><p class="MsoNormal"></p><p class="MsoNormal"><b><span style="font-size: 12pt; font-family: 宋体; ">步骤</span></b><b><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">6</span></b><b><span style="font-size: 12pt; font-family: 宋体; ">:</span></b><span style="font-size: 12pt; font-family: 宋体; ">在上面的扫描结果中,点选对应的</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">VPN</span><span style="font-size: 12pt; font-family: 宋体; ">服务器主机,将其添加到</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">Target1</span><span style="font-size: 12pt; font-family: 宋体; ">里,将预嗅探的其它客户端主机添加</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">Target2</span><span style="font-size: 12pt; font-family: 宋体; ">里。当然,也可以直接添加网关地址。此步骤为选择</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">Arp</span><span style="font-size: 12pt; font-family: 宋体; ">欺骗目标。关于</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">Arp</span><span style="font-size: 12pt; font-family: 宋体; ">欺骗原理及其它攻击内容,大家可以察看网上</span><span style="font-size: 12pt; font-family: 宋体; ">的文章,这里就不再反复讲述。</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; "><op></op></span></p><p class="MsoNormal"><b><span style="font-size: 12pt; font-family: 宋体; ">步骤</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">7</span><span style="font-size: 12pt; font-family: 宋体; ">:</span></b><span style="font-size: 12pt; font-family: 宋体; ">目标选定后,就可以开始进行</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">Arp</span><span style="font-size: 12pt; font-family: 宋体; ">欺骗式中间人攻击,点选</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">MITM</span><span style="font-size: 12pt; font-family: 宋体; ">栏里的</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">ARP Poisoning</span><span style="font-size: 12pt; font-family: 宋体; ">选项,在如下图的窗口中选择</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">Sniff remote connections</span><span style="font-size: 12pt; font-family: 宋体; ">,即嗅探远程连接内容。此时,</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">ettercap</span><span style="font-size: 12pt; font-family: 宋体; ">就开始进行</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">Arp</span><span style="font-size: 12pt; font-family: 宋体; ">双向欺骗,以截获双方通信内容了。</span><br/></p><p class="MsoNormal"><br/></p>[em05]
/ Y' ] }, G. A2 M[此贴子已经被作者于2008-5-11 11:33:50编辑过] |