Si alguna vez has utilizado Kali Linux, sabrás que tiene muchísimas herramientas para hacer casi de todo.
Netdiscover is a network address discovering tool, developed mainly for those wireless networks without dhcp server, it also works on hub/switched networks. Netdiscover is a tool that sends out ARP requests the same way that a switch or a router does; asking everyone on the network what their IP address is. It allows us to gather all the IP addresses thus providing us the ability to attack those machines we have gathered from NetDiscover. Oct 20, 2020 Evidenced through the classic 'I'm a Mac' ads. A network discovery tool that sends ARP packets to a target device or IP range and sniffs the network for responses to identify the.
También puedes instalarla en cualquier sistema operativo Linux, que en este caso te indicare como instalarlo en Ubuntu/Debian
Tranquilo no lo voy a explicar todas en esta entrada.
La herramienta que es muy sencilla de usar, se llama Net Discover.
¿Que es Net Discover?
Es una herramienta para sondear la red y así identificar a todos los dispositivos de red.
Se puede utilizar para redes inalambricas o para redes cableadas.
¿Como instalar Net Discover?
Primero si estas utilizando Kali Linux, puedes saltarte este paso ya que lo deberías tener integrado.
Mac Os Catalina
Para instalarlo en Ubuntu/Debian solo debéis ejecutar los siguientes comandos:
¿Como puedo utilizar Net Discover?
Es muy fácil de usar, para escanear solo debemos ejecutar el siguiente comando:
Como podéis ver os aparecerán varios dispositivos (A mi solo me aparece una maquina virtual).
Con esto ya veis de una manera muy rápida y sencilla como sondear a los equipos de red.
Quite often, people will ask me where they should start in Hacking. Oh my gosh! There are soooo many topics, subjects, ideas, things to memorize, things to mess with, etc… It is much too difficult to tell someone where to start. Ummmm… I guess I might say you can start with reconnaissance. Or, if stuff in this article doesn’t seem to make sense, you should probably start with a networking basics course. So, first you will want to find out about the other computers around you on a network. There are numerous ways to do this, but in this tutorial I will show you how to use a tool built into BackTrack / Kali that leverages Address Resolution Protocol or ARP to discover live hosts on the network.
As you know, ARP is used to map MAC addresses to IP addresses on an internal network. The router and switches send out broadcast ARP requests to all the MAC addresses on the network asking them to respond with their IP addresses. Each system will then respond with their IP address and the switch or other device will then create a small database that maps the MAC to the IP address, so that it it knows “who is who”.
We can use this same protocol to discover the IP addresses on a corporate, educational, wireless or other network by using Netdiscover. Its a simple tool that simply sends out ARP’s—just like a switch or router would—asking for everyone’s IP address on the network. In this way, we can gather the IP’s we need and then to attack those machines with a MitM attack, Metasploit or other attack.
Before we get started, let’s open Wireshark and look at some normal network traffic. As you can see in the screenshot below, once we open Wireshark and just wait a short while, I begin to send ARP requests. Packets 2113 and 2114 show an ARP exchange. If you look at 2113 and then scan across to the info section to the far right, you can see “who has 192.168.1.1?”. In the following packet, we see the response “192.168.1.1 is at xx:xx:xx:xx:xx:xx”. That is normal ARP traffic.
Mac Os Download
We can now create a filter in Wireshark to just look for ARP tarffic by typing “arp” in the filter window at the upper left. Now, all we see is ARP traffic as Wireshark has filtered out everything else.
Now that we see a bit of normal ARP traffic and how it works, let’s fire up BackTrack and abuse the ARP protocol to learn the IP and MAC addresses of everyone on the network.
Netdiscover Mac Os High Sierra
Step 1: Find Netdiscover
We can find netdiscover by going to either Backtrack or Kali.
In Kali, go to the Kali Linux Menu –> Information Gathering –> Live Host Identification –>Netdiscover
In Backtrack, go to the Backtrack Menu –> Information Gathering –> Network Analysis –> Identify Live Hosts –> Netdiscover.
Step 2: Open Netdiscover
When we click on netdiscover, it opens a screen like that below and displays some basic help. Netdiscover is a relatively simple tool, so there are not a lot of options.
Step 3: Netdiscover Command
Mac Os Versions
To discover the IP’s on an internal network, we will usually want to scan a range of IP addresses. In netdiscover, we can use the -r switch (for range) and then in CIDR notation provide it the network range we want it to scan. In the command below, we are asking netdiscover to find all the live hosts with IP addresses between 192.168.1.1 to 192.168.1.255. We do this by typing;
Mac Os Mojave
netdiscover -r 192.168.1.0/24
Step 4: Activate Netdiscover
Netdiscover Mac Os 10.13
As soon as we enter the command, netdiscover begins sending out ARP requests over the network and then logging the results on our screen. The process is live and interactive, so that as soon as new machines come on the network they pop up on our screen.
Netdiscover Mac Os Mojave
Netdiscover is a simple but powerful tool that uses the ARP protocol to discover live network hosts. As long as you are connected to the network and ARP is enabled on the network, you should be able to discover every live host’s IP and MAC address. Once you have those, then you can begin your strategy of exploiting those hosts.