In the arp cache poisoning it is important for attacker to enable ip forwarding so the end user will not know that his packet actually peeped by attacker and attacker can do his job without any doubt by end user.
check forwarding enabled or not:
root@bt:~# sysctl net.ipv4.ip_forward
net.ipv4.ip_forward = 0
o- ip forwarding is not enabled
1- enabled
changing ip forwarding:
root@bt:~# sysctl -w net.ipv4.ip_forward=1
or
we can change in /etc/sysctl.conf fil e and add
net.ipv4.ip forward = 1
and then run
#sysctl -p /etc/sysctl.conf
done... put ur black hat on ur head.....
check forwarding enabled or not:
root@bt:~# sysctl net.ipv4.ip_forward
net.ipv4.ip_forward = 0
or
root@bt:~# cat /proc/sys/net/ipv4/ip_forward
0
0
o- ip forwarding is not enabled
1- enabled
changing ip forwarding:
root@bt:~# sysctl -w net.ipv4.ip_forward=1
or
root@bt:~# echo 1 > /proc/sys/net/ipv4/ip_forward
orwe can change in /etc/sysctl.conf fil e and add
net.ipv4.ip forward = 1
and then run
#sysctl -p /etc/sysctl.conf
or
#service procps restartdone... put ur black hat on ur head.....
No comments:
Post a Comment