Joke Collection Website - Blessing messages - How to capture mobile phone data in LAN?

How to capture mobile phone data in LAN?

1. Use the network sniffing tool, which is also commonly known as the sniffing tool. There are many such tools, including professional sniffer pro, iris's bag grabbing tool, and many simple ones. This method captures low-level data packets and decodes them according to upper-level protocols (such as HTTP, FTP and MAIL). Function strength is related to software.

2. The principle is to set our network card to promiscuous mode. We know that the address of the network card in link layer communication is MAC, and the network card confirms whether to send its own package according to the destination MAC address. Under promiscuous mode, the network card will receive all packets in the network, whether it is addressed to itself or not. So you can get all the data in the network.

3. The problem is that in the switch environment, the switch will analyze the MAC address first, and then only forward the packet to the corresponding port. In this way, in addition to broadcast packets and multicast packets, our network card can only receive packets sent to itself, and promiscuous mode is also invalid.

4. In order to solve this problem, according to the working principle of switch and the communication principle of link layer, different solutions are put forward. For example, by sending a large number of broadcast packets, the broadcast storm is caused, which makes the switch no longer able to handle the analysis of upper-layer data, forcing the switch to work in the physical layer, which is equivalent to becoming a HUB and forwarding all data packets of all ports. The other is man-in-the-middle attack, that is, forging the MAC of both parties and sending letters to both parties at the same time, so that both parties mistake us for each other, and then send us the data packets to be sent to each other, which we will process and forward to the real receiver at the same time, so as to get the data. If you can disguise yourself as a gateway, all external communication can be obtained.

5. In the case of wireless transmission, radio waves always propagate in public areas, so data must be encrypted to ensure security, and different encryption methods can be used according to levels and needs. At this time, there is also a special sniffer tool for wireless. As for whether it can be decrypted or cracked, it needs a little luck.

6. This is low-level. You can disguise yourself as a required role according to the principles of various layers of protocols, so as to obtain relevant information. For example, it can be disguised as DNS, mail server and so on.

7, the road is one foot high and the magic is one foot high. Where there are loopholes, there are solutions. For example, make special settings for switches, use conservative packet loss handling methods during storms, or bind IP addresses, HTTPS and DNS extension protocols at the application layer. Always move forward in attack and defense.