Joke Collection Website - Blessing messages - How to capture mobile phone data in LAN?
How to capture mobile phone data in LAN?
2. The principle is to set our network card to promiscuous mode. We know that the address of the network card in link layer communication is MAC, and the network card confirms whether to send its own package according to the destination MAC address. Under promiscuous mode, the network card will receive all packets in the network, whether it is addressed to itself or not. So you can get all the data in the network.
3. The problem is that in the switch environment, the switch will analyze the MAC address first, and then only forward the packet to the corresponding port. In this way, in addition to broadcast packets and multicast packets, our network card can only receive packets sent to itself, and promiscuous mode is also invalid.
4. In order to solve this problem, according to the working principle of switch and the communication principle of link layer, different solutions are put forward. For example, by sending a large number of broadcast packets, the broadcast storm is caused, which makes the switch no longer able to handle the analysis of upper-layer data, forcing the switch to work in the physical layer, which is equivalent to becoming a HUB and forwarding all data packets of all ports. The other is man-in-the-middle attack, that is, forging the MAC of both parties and sending letters to both parties at the same time, so that both parties mistake us for each other, and then send us the data packets to be sent to each other, which we will process and forward to the real receiver at the same time, so as to get the data. If you can disguise yourself as a gateway, all external communication can be obtained.
5. In the case of wireless transmission, radio waves always propagate in public areas, so data must be encrypted to ensure security, and different encryption methods can be used according to levels and needs. At this time, there is also a special sniffer tool for wireless. As for whether it can be decrypted or cracked, it needs a little luck.
6. This is low-level. You can disguise yourself as a required role according to the principles of various layers of protocols, so as to obtain relevant information. For example, it can be disguised as DNS, mail server and so on.
7, the road is one foot high and the magic is one foot high. Where there are loopholes, there are solutions. For example, make special settings for switches, use conservative packet loss handling methods during storms, or bind IP addresses, HTTPS and DNS extension protocols at the application layer. Always move forward in attack and defense.
- Previous article:What is Huawei leather case mode?
- Next article:Wang Han sent a text message.
- Related articles
- Can you find the deleted information?
- Will Shenzhen critical illness insurance automatically deduct 202 1?
- 315 party in 2023?
- What eggs does vivoy76s have?
- What are the main sending directions of point-to-point SMS?
- How to use China Bank's China Bank E Order? It's useless after my dad got it back. Is it not activated? How to activate?
- Teacher Zhou Ming introduced
- Has the approval been really approved after receiving the approval text message?
- How to send group messages in QQ
- Can the convenient bee information collector do it?