Therefore, the victim laptop start sending information to the wrong MAC address. The new physical address is the MAC address of the host OS of the attacking laptop (so not the MAC address of the virtual adapter that Kali Linux uses)! I use the following commands: echo 1 > /proc/sys/net/ipv4/ip_forwardĪrpspoof -i eth0 -t 192.168.1.63 -r 192.168.1.254Īfter executing the commands above, I can see that the physical address of the 192.168.1.254 (the router) changes in the victim's laptop ARP tabel (using arp -a). In VirtualBox I bridged my build-in wifi adapter to the virtual environment (I have no external USB wifi adapter). To do this is run Kali Linux in a virtual environment using VirtualBox on the attacking laptop. With one laptop (attacking laptop) I try to get in the middle of the connection of other laptop (victim laptop). At home I have two laptops (running on Windows).
0 Comments
Leave a Reply. |