Sniffing includes catching, translating, inspecting, and interpreting the data inside a network packet on a TCP/IP arrangement. In this Kali Linux Tutorial, we show you how to use Ettercap.
Ettercap is a comprehensive suite for man-in-the-middle attacks. It features sniffing of live connections, content filtering on the fly, and many other interesting tricks.
It supports active and passive dissection of many protocols and includes many features for network and host analysis.
Step 1: To Run the GUI version of Ettercap.
root@kali:~# ettercap -G
Step2: Select Sniff >> Unified Sniffing >> Network Interface
Select Interface based on the network adapter that you are using.
Step 3: Now select the host from the Host list. Hosts >> Hostlist or ctrl+H and add to target.
Step 4: Now go to Mitm >> ARP poisoning and select Sniff remote connections.
Step 5: Now we are ready to sniff connections, let’s move to the target machine and enter the login credentials. Here we are using a test page.
Step 6: Now get back to KaliLinux to check out the results.
Here you can find the login credentials provided on the test page.
Also Read
Some router models have identified a security vulnerability that allows attackers to bypass authentication. To exploit this vulnerability, an attacker…
Hackers often target CrushFTP servers as they contain sensitive data and are used for file sharing and storage. This makes…
DDoS attacks are a significant and growing risk that can overpower websites, crash servers, and block out authorized users with…
Hackers have leveraged an old Microsoft Office vulnerability, CVE-2017-8570, to deploy the notorious Cobalt Strike Beacon, targeting systems in Ukraine.…
In a historic move, Microsoft has made the source code for MS-DOS 4.0, one of the most influential operating systems…
A new attack campaign has been discovered to be employed by the FROZEN#SHADOW, which utilized SSLoad malware for its operations…
View Comments