Login Register






The stories and information posted here are artistic works of fiction and falsehood. Only a fool would take anything posted here as fact.
Thread Rating:
  • 0 Vote(s) - 0 Average


Network Sniffing with ETTERCAP (GUI) fully explained(part-1) filter_list
Author
Message
Network Sniffing with ETTERCAP (GUI) fully explained(part-1) #1
Sniffing With Ettercap
1. What is Sniffing
Ans. Sniffing is a data interception technology. Sniffer is a program that monitor or reading all network traffic passing in and out over a network. Telnet, Relogin, FTP, NNTP, SMTP, HTTP, IMAP that all protocol are vulnerable for sniffing because it send data and password in clear text. Sniffing can be use both the ways legally or illegally like for monitor network traffic, network security and for stealing information like password, files from the network. Sniffing can be done both way one is from command line utility and other is from GUI interface. Sniffing is Used In LAN OR WAN Network. In sniffing we can do
• MITM(man in the middle ATTACK)
• DNS Poisoning
• HTTP and HTTPS Sniffing
• Fake Authentication

So LET’s start With MITM
To intercept Information coming, or going to the router by spoofing your physical and logical Addresses is called MITM.
Now What we want.

1. Backtrack operating System.
2. Ettercap tool
3. Company Network LAN or WAN


So let’s start
• Start Backtrack Machine
• Open Terminal

[Image: arp.png]

• Type -“ettercap-G”
• Click “sniff”
• Click “unified Sniffing”

[Image: arp2.png]

[Image: arp3.png]

• Under hosts tab click “scan for hosts”

[Image: arp4.png]

• After hosts is scaned click on “hosts list”

[Image: arp6.png]

• Then click on router ip Eg.192.168.1.1 and click on “add to target 2”

[Image: arp6.png]

• Then click victim eg.192.168.1.10 which you want to poison click on “add to target 1”

[Image: arp7.png]

• Under MITM tab click “arp poisoning”

[Image: arp8.png]

• Then Click “sniff remote connections”

[Image: arp9.png]

• Then under the start tab Click on “start sniffing”

[Image: arp10.png]

• Now On victim Machine When User open any non https website and login there username password is sniffed.
• Eg.When user Open non-https site

[Image: arp12.png]

• Types username and password

[Image: arp13.png]

• We Got the user name And Password Here.

[Image: arp14.png]

So That is Called Man in the middle attack we can do same thing in HTTPS service. Next part on HTTPS wait for my next part..

Enjoy The ARP Poisoning..........:headbash:WinkCool:dance::wub::bye:

Reply

RE: **[TUT]Network Sniffing with ETTERCAP (GUI) fully explained(part-1)*** #2
Nice and Smart thread , definetly wait for next part !!
[Image: Wfxdx.png]

Reply

RE: **[TUT]Network Sniffing with ETTERCAP (GUI) fully explained(part-1)*** #3
nice one bro waiting to the next step and hope u can send me the link thank you

Reply

RE: **[TUT]Network Sniffing with ETTERCAP (GUI) fully explained(part-1)*** #4
wowoow....perfect ....thnx for sharing

Reply

RE: **[TUT]Network Sniffing with ETTERCAP (GUI) fully explained(part-1)*** #5
i installed ettercap 7.4.1 in windows 7 , however everytime i do this step
"• Click “sniff”
• Click “unified Sniffing”"

eth0 dont appear and oly this appear: http://prntscr.com/kfos2

then i click OK and ettercap always stop working :/ what is the main problem ? ....

thank you ,
loonatic

Reply

RE: **[TUT]Network Sniffing with ETTERCAP (GUI) fully explained(part-1)*** #6
Nice tutorial. very detailed! Smile

Reply

RE: **[TUT]Network Sniffing with ETTERCAP (GUI) fully explained(part-1)*** #7
http://www.youtube.com/watch?v=n9Ouc5Wsr08

Good video about arp poisoning: first explains what exactly is and then shows it in practice.

By the way, some time ago I was trying this on bt5. Both computers were connected via cable, and on the router there were only those 2 pc -> mine and victim's (also mine).
Whenever I tried to poison arp, it showed "Arp poisoning successfull.", but when I checked it with plugin "Check_poison" or smth like that, it returns "No arp poison were found."
And of course sniffing also wasn't successful, only thing I got were a bunch of errors. Any idea why it happened?

Reply

RE: **[TUT]Network Sniffing with ETTERCAP (GUI) fully explained(part-1)*** #8
I just want to say that if the network has a good secured gateway and if the victim has a good antivirus, the MITM attack will not work. I don't know yet how to bypass this problem but I think that the best way to do a successfull MITM attack is to bypass the antivirus with an exploit with metaploit to avoid any blocking from the antivirus then try the MITM attack (more chance to work)

I tried MITM attack on a friend computer on the university network and it didn't work so ... ^^

But I have a question: how to do a host scan with command line only ?

Reply

RE: **[TUT]Network Sniffing with ETTERCAP (GUI) fully explained(part-1)*** #9
(11-24-2012, 03:24 PM)Faner Wrote: http://www.youtube.com/watch?v=n9Ouc5Wsr08

Good video about arp poisoning: first explains what exactly is and then shows it in practice.

By the way, some time ago I was trying this on bt5. Both computers were connected via cable, and on the router there were only those 2 pc -> mine and victim's (also mine).
Whenever I tried to poison arp, it showed "Arp poisoning successfull.", but when I checked it with plugin "Check_poison" or smth like that, it returns "No arp poison were found."
And of course sniffing also wasn't successful, only thing I got were a bunch of errors. Any idea why it happened?
you don't have any gateway or router connected in physical machine.
use this in vmware and use NAT network.. it have virtual router..

Reply

RE: **[TUT]Network Sniffing with ETTERCAP (GUI) fully explained(part-1)*** #10
Cain&Abel is much easier to use! Much noob-friendly gui. Works on pretty much everything! Smile
If you're cool click this: http://adf.ly/MWQtY

My newly created blog: http://www.learn-basic-hacking.blogspot.dk/

Reply







Users browsing this thread: 3 Guest(s)