-
That's how the ARP virus came about
-
Categories: Computer, Networking, >> Hardware.
Problem description: If I find someone controlling my traffic with a P2P terminator in the LAN, but I can't touch his computer, how can I make my computer unrestrictedUrgent need for solution!!
Analysis: P2P terminator uses ARP sniffing and ARP spoofing methods, so the basic way to crack P2P terminator is to use ARP attack method, which can be summarized as follows:
1.Use a VLAN
As long as your PC and P2P Terminator software are not in the same VLAN, he can't do anything about you.
2.Use a two-way IP MAC binding.
Bind the MAC address of your egress router on the PC, the P2P terminator software can't ARP spoofing you, and naturally it can't control you, but it's just the MAC of the PC bound router
It's not safe yet, because P2P terminator software can spoof routes, so the best solution is to use a PC, which binds on a two-way IP MAC on the route, that is, on the PC
Bind the MAC address of the outgoing route, bind the IP and MAC address of the PC on the route, so that the route needs to support IP MAC binding, such as the Hiper router.
3.Use IP MAC address theft + IP MAC binding.
You simply change your MAC address and IP address to the same IP and MAC as the one running the P2P terminator software, and see how he manages it, this is a lose-lose solution, and there must be some tricks in the change, otherwise it will report an IP conflict. You have to change the MAC address first, and then change the IP, so that Windows doesn't report IP conflicts (Windows is stupid))) This step is not finished, it is better that you bind the MAC address of the route on the PC, so that the P2P terminator spoofs the route in vain.
XP system: Just use the arp command to bind your own mac and route mac, such as: arp your own ip your own mac
ARP Router IP Route MAC
It's best to bind them.,I've tried.,If you only bind routes.,If there's an IP conflict, you can't go up.,Others can still t you go offline.。 If you bind yourself, you can also access the Internet even if the IP conflicts.
9x 2000 will require software.
ei/best/showdown?soft_id=106
Set the routing IP address, MAC
However, I have installed this software on the XP system, and I can clearly see who wants to take you offline or want to restrict you.
It is recommended to replace the XP
As long as the above is set, the P2P terminator is scrapped, and the XP system enters in the cmd state: arp -a
If the last state of the routing IP address and its own IP address is static, then the binding is successful.
arp -d
It's also a good idea to enter it before binding and delete the illegal binding.
Because P2P will continue to send packets in the network to query the network status. This way everyone will be slow. Plus now the software is developed. >>>More
Definitely useful, I also have someone here who is using P2P control, I have no problem after turning on 360ARP. First of all, I will tell you how P2P controls other people's Internet speed, P2P is mainly an ARP attack that limits other people's Internet speed by hypocritically or tampering with ARP. If you install 360ARP, you can prevent others from using it to control your Internet speed, even if others turn on P2P, they can't control your Internet speed.
The P2P mode occupies a lot of bandwidth, like the current BT**, Thunderbolt, Electric Mule, Electric Snail, etc., P2P Terminator is to limit the bandwidth of this ** method or turn it off directly, in order to ensure the need for normal Internet bandwidth.
Asset allocation planning can be done, that is, eggs are not put in one basket, asset allocation is to diversify risks, and reasonable distribution of returns can be maximized >>>More
Fault description: The pressure sensor voltage of the diesel exhaust gas treatment device (DPF) is too high; >>>More