I applied arpspoof from my Linux machine locally to test it out and it did cause the target to stop having internet access. Now today I wanted to level up and do a man in the middle instead of only denial of service. I didn’t get it working initially, so as a sanity check, tried the simple arpspoof DoS. This no doesn’t work any longer either. I played with the ip_forward file under /proc/sys/net/ipv4/, writing 1 to it, and then later I used systemctl to make it 0 again. This is what’s needed to turn on forwarding from what I’ve read. Could playing with this be the reason?
Edit: I’ve now spoofed the target and the gateway from two different hacking machines simultaneously. That worked first time round. After cleaning, then trying each individually didn’t work. Then trying with both simultaneously again didn’t work. Does the target device/gateway somehow realise that arpspoofing is happening and learn to ignore the messages?
[link] [comments]
from hacking: security in practice https://ift.tt/MZbflPK
Comments
Post a Comment