-
Same situation as me! If the first reinstall system is still this network cable, it will still be attacked! I reinstalled the system and changed it to another network cable, so this situation was eliminated!
Hope it helps!
-
Hehe, revenge. Tell you that there is no way, this virus can only be effective in the local area network, and when you are infected, you will find that you might as well not retaliate. Because it is not so simple to kill after you are poisoned, because the network speed will slow down after poisoning, and the killing will fail.
Therefore, you should install antivirus software protection system after using a special anti-virus system to prevent yourself from being poisoned, install an arp firewall and let him attack.
Thank you.
-
Zhihui13's VLINK virtual link, which seems to have MAC address hiding function.
Sky **station has** (64x and 32x systems are different, **pay attention to it, but you can't find .......)Since I can't post the link, you can send me a private message if you want, and I'll send the link to the private message.
There is also an anti-arpspoof (also called: anti-ARP deception weapon) of earthling software, and the sky **station also has**. Note: Wincap needs to be installed. It's older, but it's still very easy to use.
The premise is that there must be the correct gateway IP address and MAC address, which can usually be obtained automatically, if the anti-arpspoof software can not be obtained automatically, please try to change the network to a slightly normal time to get it once, save it to a notepad, and fill it in every time you use it.
I have both software, you can send me a private message, and I can send it to you.
-
How can I quickly detect and locate the ARP virus in the LAN?
Faced with hundreds of computers in a local area network, it is obviously not a good idea to detect them one by one. In fact, we only need to use the basic principle of ARP virus: send a fake ARP deception broadcast, and the poisoned computer itself disguises itself as a gateway, so that we can quickly lock the poisoned computer.
It is conceivable that the program can be used to achieve the following functions: when the network is normal, keep the IP address and MAC address of the correct gateway firmly in mind, and monitor the ARP packets from it in real time, when it is found that there is an ARP packet broadcast, its IP address is the IP address of the correct gateway, but its MAC address is the MAC address of other computers, at this time, it is undoubtedly ARP spoofing. This suspicious MAC address alarm, according to the network when the IP MAC address comparison table query the computer, locate the hungry IP address, so that the poisoned computer is located.
Let's take a closer look at how to use the command line to detect ARP poisoning on your computer.
Command line method. This method is relatively simple, and it can be completed by using the system's built-in arp commands without using third-party tools. * When ARP spoofing occurs in the local area network, the ARP virus computer will send ARP spoofing broadcasts to non-stop, then other computers in the LAN will dynamically update their ARP cache table, and record the MAC address of the gateway as the MAC address of the ARP virus computer, at this time, we only need to query the MAC address of the current gateway in other affected computers, we will know the MAC address of the poisoned computer, the query command is arp a, you need to enter it under the cmd command prompt.
The following information is returned:
internet address physical address type
00-50-56-e6-49-56 dynamic
At this time, since the ARP table of this computer is an error record, therefore, the MAC address is not the MAC address of the real gateway, but the MAC address of the poisoned computer! At this time, according to the IP-MAC address comparison table when the network is normal, you can find the IP address of the poisoned computer. It can be seen that when the network is normal, it is very important to save a computer's IP-MAC address comparison table.
You can use the NBTSCAN tool to scan the IP address and MAC address of the segment and save it for later use.
-
The best way is to bind the IP MAC address on the router, even if someone else steals your IP, he will not be able to access the Internet.
Then find the host of the stolen IP through the MAC address, and record the MAC addresses of all hosts in advance through administrative means of punishment, when the IP address is stolen, use the ping command to ping the stolen IP, and then use arp -a to display the MAC address corresponding to the IP address, and through the recorded MAC address, you can find the corresponding host.
Some time ago, our company was also attacked, the reason is that the employee received and clicked on the virus, which once paralyzed the company's intranet. >>>More
I think there should be someone in the LAN who uses ARP to spoof Trojan programs (such as: World of Warcraft, Audition and other number-stealing software, and some plug-ins have also maliciously loaded this program). >>>More
Right-click on my computer - computer name - to see if the computers are in the same workgroup. To set to the same, if you use a domain, set it to the same domain. >>>More
If the load hits, you need to replace the router otherwise the data exchange will be very slow, which will affect the Internet speed. After the replacement, the router can be turned off to automatically assign IP to the user, and each client must be set in the network connection. Look specifically at the router manual, which is there. >>>More
Interstellar II cannot play LAN, it can only play stand-alone or link to BATTLENET to play network, but you need to buy CDKEY on BATTLENET and then activate it. >>>More