Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/Virus-V/arpZebra
ARP+DNS欺骗工具,网络安全第三次实验,课堂演示用,严禁非法用途。ARPSpoof,wifi hijack,dns spoof
https://github.com/Virus-V/arpZebra
Last synced: 10 days ago
JSON representation
ARP+DNS欺骗工具,网络安全第三次实验,课堂演示用,严禁非法用途。ARPSpoof,wifi hijack,dns spoof
- Host: GitHub
- URL: https://github.com/Virus-V/arpZebra
- Owner: Virus-V
- License: mit
- Created: 2018-05-20T14:22:12.000Z (over 6 years ago)
- Default Branch: master
- Last Pushed: 2018-05-28T12:22:24.000Z (over 6 years ago)
- Last Synced: 2024-10-18T07:55:30.324Z (17 days ago)
- Language: Go
- Homepage:
- Size: 12.7 KB
- Stars: 37
- Watchers: 2
- Forks: 8
- Open Issues: 1
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
- awesome-hacking-lists - Virus-V/arpZebra - ARP+DNS欺骗工具,网络安全第三次实验,课堂演示用,严禁非法用途。ARPSpoof,wifi hijack,dns spoof (Go)
README
# arpZebra
ARP+DNS欺骗工具,通达网络安全第三次实验,课堂演示用,严禁非法用途。ARPSpoof,wifi hijack,dns spoof
## Usage:
`./arpZebra -interface wlp5s0 -target "192.168.1.100,192.168.1.1" -gateway "192.168.1.1" -dnscfg ./config.yml`
- -interface 需要监听的网卡,例子是我笔记本电脑的无线网卡
- -target 需要把哪些主机的流量转到我的电脑,可以指定多个主机,
"1.2.3.4" 或者 "1.2.3.0/24" 或者 "1.2.3-7.4-12" 或者 "1.2.3.*" 或者前面几种的集合 "1.2.3.4, 1.2.3.0/24, ..."
- -gateway 网关地址,用来ip包转发,把这些主机中到外网的ip包转发给网关
- -dnscfg DNS欺骗配置,配置欺骗哪些域名和欺骗的地址,拦截特定的DNS请求包
-------
## DNS欺骗配置文件语法
```yaml
targets:
- address: 10.0.0.8
matches:
- "google\\.com"
- ".\\.google\\.com"
- address: 192.168.1.105
matches:
- "."
- address: 192.168.1.100
matches:
- ".\\.baidu\\.com"
- ".\\.qq\\.com"
```