Mininet (Rapid Prototyping for Software Defined Networks)-4-

In this tutorial, i will show that i used mininet to simulate the ARP attack environment.Emulation environment was discussed in the previous article.

H1 is user, constantly communicating with H2.
H4 is hacker, trying to eavesdrop on H1 and H2.

For the first step, you need to install some packages:

sudo apt-get install zlib1g zlib1g-devsudo apt-get install build-essentialsudo apt-get install ettercap

you can use this command sudo apt-get install ettercap-graphical if you have some problems.

Here is my topology.py

#!/usr/bin/env pythonfrom mininet.cli import CLIfrom mininet.net import Mininetfrom mininet.link import Link,TCLinkif '__main__' == __name__ : net = Mininet(link=TCLink) h1 = net.addHost('h1', ip="192.168.10.1/24", mac="00:00:00:00:00:01") h2 = net.addHost('h2', ip="192.168.10.2/24", mac="00:00:00:00:00:02") h3 = net.addHost('h3', ip="192.168.20.1/24", mac="00:00:00:00:00:03") h4 = net.addHost('h4', ip="192.168.10.3/24", mac="00:00:00:00:00:04") r0 = net.addHost('r0') s0 = net.addHost('s0') net.addLink(h1, s0) net.addLink(h2, s0) net.addLink(s0, r0) net.addLink(r0, h3) net.addLink(s0, h4) net.build() r0.cmd("echo 1 > /proc/sys/net/ipv4/ip_forward") r0.cmd('ifconfig r0-eth0 192.168.10.254 netmask 255.255.255.0') r0.cmd('ifconfig r0-eth1 192.168.20.254 netmask 255.255.255.0') h1.cmd("ip route add default via 192.168.10.254 dev h1-eth0") h2.cmd("ip rotue add default via 192.168.10.254 dev h2-eth0") h3.cmd("ip route add default via 192.168.20.254 dev h3-eth0") h4.cmd("ip route add default via 192.168.10.254 dev h4-eth0") s0.cmd("brctl addbr br0") s0.cmd("brctl addif br0 s0-eth0") s0.cmd("brctl addif br0 s0-eth1") s0.cmd("brctl addif br0 s0-eth2") s0.cmd("brctl addif br0 s0-eth3") #s0.cmd("brctl setageing br0 0")  s0.cmd("ifconfig br0 up") CLI(net) net.stop()

i open h1 and h4 with xterm. h1 is talking to h2, but h4 can't hear it.
http://img2.58codes.com/2024/20126989yD8qZ8RuQL.png
http://img2.58codes.com/2024/201269894MM6r9Gv3Q.png

At this moment,i open the other h4 terminal and use this command ettercap -G to open ettercap.http://img2.58codes.com/2024/20126989ZhLiSiQzg3.png

Select the port you want to listen on
http://img2.58codes.com/2024/20126989FVqM86u7Ye.png
4.Set 192.168.10.1 to TARGET1 --> which means to cheat 192.168.10.1 and I'm 192.168.10.2
Set 192.168.10.2 to TARGET2 --> which means to cheat 192.168.10.2 and I'm 192.168.10.1
http://img2.58codes.com/2024/20126989gCRhno4Acs.png
http://img2.58codes.com/2024/20126989O0zVo75EkO.png
5.Select ARP poisoning
http://img2.58codes.com/2024/20126989L1OPz7as7x.png
6.Press OK
http://img2.58codes.com/2024/20126989KHrhIupo0A.png
7.The moment when you press Ok, you will find that the h1-> h2 message has been monitored by h4!!
http://img2.58codes.com/2024/20126989VzBnnTPKQn.png
8.you can use this command arp -n to verify whether arp is the host name.As you can see, although the different IP addresses have the same Mac Address!!
http://img2.58codes.com/2024/20126989Q0J82P83VR.png
9.Preventive measures:Set Static ARP!!
http://img2.58codes.com/2024/20126989YVWyKiOrBk.png
After setting, h4 can't hear it !
http://img2.58codes.com/2024/20126989TMNN9H0Fkc.png


关于作者: 网站小编

码农网专注IT技术教程资源分享平台,学习资源下载网站,58码农网包含计算机技术、网站程序源码下载、编程技术论坛、互联网资源下载等产品服务,提供原创、优质、完整内容的专业码农交流分享平台。

热门文章