{"id":67,"date":"2014-06-24T05:17:04","date_gmt":"2014-06-24T05:17:04","guid":{"rendered":"http:\/\/ixyzero.com\/blog\/?p=67"},"modified":"2014-06-24T05:17:04","modified_gmt":"2014-06-24T05:17:04","slug":"kali-linux%e4%b8%8b%e7%9a%84arp%e4%be%a6%e6%b5%8b%e5%b7%a5%e5%85%b7__netdiscover","status":"publish","type":"post","link":"https:\/\/ixyzero.com\/blog\/archives\/67.html","title":{"rendered":"Kali Linux\u4e0b\u7684ARP\u4fa6\u6d4b\u5de5\u5177__netdiscover"},"content":{"rendered":"<div><strong><span style=\"color: #ff0000; font-size: large;\">Kali Linux\u4e0b\u7684ARP\u4fa6\u6d4b\u5de5\u5177__netdiscover<\/span><\/strong><\/div>\n<div>\n<pre class=\"wrap:false lang:sh decode:true crayon-selected\">root@hi:~# netdiscover -h\nNetdiscover 0.3-beta7 [Active\/passive arp reconnaissance tool]\nWritten by: Jaime Penalba &lt;jpenalbae@gmail.com&gt;\n\nUsage: netdiscover [-i device] [-r range | -l file | -p] [-s time] [-n node] [-c count] [-f] [-d] [-S] [-P] [-C]\n  -i device: your network device\n  -r range: scan a given range instead of auto scan. 192.168.6.0\/24,\/16,\/8\n  -l file: scan the list of ranges contained into the given file\n  -p passive mode: do not send anything, only sniff\n  -F filter: Customize pcap filter expression (default: \"arp\")\n  -s time: time to sleep between each arp request (miliseconds)\n  -n node: last ip octet used for scanning (from 2 to 253)\n  -c count: number of times to send each arp reques (for nets with packet loss)\n  -f enable fastmode scan, saves a lot of time, recommended for auto\n  -d ignore home config files for autoscan and fast mode\n  -S enable sleep time supression betwen each request (hardcore mode)\n  -P print results in a format suitable for parsing by another program\n  -L in parsable output mode (-P), continue listening after the active scan is completed\n\nIf -r, -l or -p are not enabled, netdiscover will scan for common lan addresses.<\/pre>\n<\/div>\n<div>\u5982\u679c\u4e0d\u5e26\u4efb\u4f55\u53c2\u6570\u7684\u8bdd\uff0cnetdiscover\u547d\u4ee4\u6216\u4ece\u5e38\u89c1\u7684\u5c40\u57df\u7f51\u5730\u5740\u8fdb\u884c\u626b\u63cf\uff0c\u5982\uff1a192.168.0.0-192.168.254.0\/24,\/16,\/8<\/div>\n<div><\/div>\n<div>\u4f7f\u7528\u793a\u4f8b\uff1a<\/p>\n<div>\n<pre class=\"lang:batch decode:true \">root@hi:~# netdiscover\n\u00a0\n\u00a0Currently scanning: 192.168.93.0\/16\u00a0\u00a0 |\u00a0\u00a0 Screen View: Unique Hosts\n\u00a0\n\u00a029 Captured ARP Req\/Rep packets, from 10 hosts.\u00a0\u00a0 Total size: 1740\n\u00a0_____________________________________________________________________________\n\u00a0\u00a0 IP\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 At MAC Address\u00a0\u00a0\u00a0\u00a0\u00a0 Count\u00a0 Len\u00a0\u00a0 MAC Vendor\n\u00a0-----------------------------------------------------------------------------\n\u00a0192.168.1.7\u00a0\u00a0\u00a0\u00a0 44:6d:57:e1:35:4c\u00a0\u00a0\u00a0 06\u00a0\u00a0\u00a0 360\u00a0\u00a0 Unknown vendor\n\u00a0192.168.1.1\u00a0\u00a0\u00a0\u00a0 1c:fa:68:11:ef:57\u00a0\u00a0\u00a0 03\u00a0\u00a0\u00a0 180\u00a0\u00a0 Unknown vendor\n\u00a0192.168.1.100\u00a0\u00a0 20:68:9d:92:f3:d7\u00a0\u00a0\u00a0 06\u00a0\u00a0\u00a0 360\u00a0\u00a0 Unknown vendor\n\u00a0192.168.1.102\u00a0\u00a0 fc:25:3f:90:a9:c4\u00a0\u00a0\u00a0 01\u00a0\u00a0\u00a0 060\u00a0\u00a0 Unknown vendor\n\u00a0192.168.1.106\u00a0\u00a0 20:68:9d:1b:b0:54\u00a0\u00a0\u00a0 02\u00a0\u00a0\u00a0 120\u00a0\u00a0 Unknown vendor\n\u00a0192.168.1.104\u00a0\u00a0 0c:8b:fd:0b:bb:16\u00a0\u00a0\u00a0 03\u00a0\u00a0\u00a0 180\u00a0\u00a0 Unknown vendor\n\u00a0192.168.1.187\u00a0\u00a0 50:46:5d:b2:22:4a\u00a0\u00a0\u00a0 01\u00a0\u00a0\u00a0 060\u00a0\u00a0 Unknown vendor\n\u00a0192.168.1.190\u00a0\u00a0 60:a4:4c:33:0d:07\u00a0\u00a0\u00a0 01\u00a0\u00a0\u00a0 060\u00a0\u00a0 Unknown vendor\n\u00a0192.168.1.103\u00a0\u00a0 30:85:a9:f6:38:9f\u00a0\u00a0\u00a0 04\u00a0\u00a0\u00a0 240\u00a0\u00a0 Unknown vendor\n\u00a0192.168.1.111\u00a0\u00a0 20:68:9d:1b:b0:54\u00a0\u00a0\u00a0 02\u00a0\u00a0\u00a0 120\u00a0\u00a0 Unknown vendor<\/pre>\n<p>&nbsp;<\/p>\n<\/div>\n<div>\u4f7f\u7528-r\u9009\u9879\u624b\u52a8\u6307\u5b9a\u626b\u63cf\u533a\u95f4(CIDR\u5730\u5740\u5757\u5f62\u5f0f)\uff1a<\/div>\n<pre class=\"lang:batch decode:true\">root@hi:~\/Desktop\/2014-2# netdiscover -r 192.168.1.1\/24\n\u00a0\n\u00a0Currently scanning: Finished!\u00a0\u00a0 |\u00a0\u00a0 Screen View: Unique Hosts\n\u00a0\n\u00a094 Captured ARP Req\/Rep packets, from 8 hosts.\u00a0\u00a0 Total size: 5640\n\u00a0_____________________________________________________________________________\n\u00a0\u00a0 IP\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 At MAC Address\u00a0\u00a0\u00a0\u00a0\u00a0 Count\u00a0 Len\u00a0\u00a0 MAC Vendor\n\u00a0-----------------------------------------------------------------------------\n\u00a0192.168.1.100\u00a0\u00a0 20:68:9d:92:f3:d7\u00a0\u00a0\u00a0 86\u00a0\u00a0\u00a0 5160\u00a0\u00a0 Unknown vendor\n\u00a0192.168.1.1\u00a0\u00a0\u00a0\u00a0 1c:fa:68:11:ef:57\u00a0\u00a0\u00a0 01\u00a0\u00a0\u00a0 060\u00a0\u00a0 Unknown vendor\n\u00a0192.168.1.7\u00a0\u00a0\u00a0\u00a0 44:6d:57:e1:35:4c\u00a0\u00a0\u00a0 02\u00a0\u00a0\u00a0 120\u00a0\u00a0 Unknown vendor\n\u00a0192.168.1.106\u00a0\u00a0 20:68:9d:1b:b0:54\u00a0\u00a0\u00a0 01\u00a0\u00a0\u00a0 060\u00a0\u00a0 Unknown vendor\n\u00a0192.168.1.104\u00a0\u00a0 0c:8b:fd:0b:bb:16\u00a0\u00a0\u00a0 01\u00a0\u00a0\u00a0 060\u00a0\u00a0 Unknown vendor\n\u00a0192.168.1.111\u00a0\u00a0 20:68:9d:1b:b0:54\u00a0\u00a0\u00a0 01\u00a0\u00a0\u00a0 060\u00a0\u00a0 Unknown vendor\n\u00a0192.168.1.187\u00a0\u00a0 50:46:5d:b2:22:4a\u00a0\u00a0\u00a0 01\u00a0\u00a0\u00a0 060\u00a0\u00a0 Unknown vendor\n\u00a0192.168.1.190\u00a0\u00a0 60:a4:4c:33:0d:07\u00a0\u00a0\u00a0 01\u00a0\u00a0\u00a0 060\u00a0\u00a0 Unknown vendor<\/pre>\n<p>\u6548\u679c\u8fd8\u662f\u5f88\u4e0d\u9519\u7684\uff0c\u901f\u5ea6\u5f88\u5feb\uff0c\u6bd4\u7528Wireshark\u6293\u5305\u81ea\u5df1\u5206\u6790\u8981\u5feb\u548c\u65b9\u4fbf\u3002<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Kali Linux\u4e0b\u7684ARP\u4fa6\u6d4b\u5de5\u5177__netdiscover root@hi:~# netdiscover [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11,25,12],"tags":[67,30],"class_list":["post-67","post","type-post","status-publish","format-standard","hentry","category-linux","category-security","category-tools","tag-kali","tag-linux"],"views":3015,"_links":{"self":[{"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/posts\/67","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/comments?post=67"}],"version-history":[{"count":0,"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/posts\/67\/revisions"}],"wp:attachment":[{"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/media?parent=67"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/categories?post=67"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/tags?post=67"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}