Network Sniffing with ETTERCAP (GUI) fully explained(part-1) 09-20-2012, 05:47 PM
#1
Sniffing With Ettercap
1. What is Sniffing
Ans. Sniffing is a data interception technology. Sniffer is a program that monitor or reading all network traffic passing in and out over a network. Telnet, Relogin, FTP, NNTP, SMTP, HTTP, IMAP that all protocol are vulnerable for sniffing because it send data and password in clear text. Sniffing can be use both the ways legally or illegally like for monitor network traffic, network security and for stealing information like password, files from the network. Sniffing can be done both way one is from command line utility and other is from GUI interface. Sniffing is Used In LAN OR WAN Network. In sniffing we can do
• MITM(man in the middle ATTACK)
• DNS Poisoning
• HTTP and HTTPS Sniffing
• Fake Authentication
So LET’s start With MITM
To intercept Information coming, or going to the router by spoofing your physical and logical Addresses is called MITM.
Now What we want.
1. Backtrack operating System.
2. Ettercap tool
3. Company Network LAN or WAN
So let’s start
• Start Backtrack Machine
• Open Terminal
![[Image: arp.png]](http://s19.postimage.org/xpwkdy1o3/arp.png)
• Type -“ettercap-G”
• Click “sniff”
• Click “unified Sniffing”
![[Image: arp2.png]](http://s19.postimage.org/4c0tycyyb/arp2.png)
![[Image: arp3.png]](http://s19.postimage.org/i6z4gttdf/arp3.png)
• Under hosts tab click “scan for hosts”
![[Image: arp4.png]](http://s19.postimage.org/ubedxt69f/arp4.png)
• After hosts is scaned click on “hosts list”
![[Image: arp6.png]](http://s19.postimage.org/yykfzktmb/arp6.png)
• Then click on router ip Eg.192.168.1.1 and click on “add to target 2”
![[Image: arp6.png]](http://s19.postimage.org/yykfzktmb/arp6.png)
• Then click victim eg.192.168.1.10 which you want to poison click on “add to target 1”
![[Image: arp7.png]](http://s19.postimage.org/g8sgiu0vn/arp7.png)
• Under MITM tab click “arp poisoning”
![[Image: arp8.png]](http://s19.postimage.org/45n4v9ptf/arp8.png)
• Then Click “sniff remote connections”
![[Image: arp9.png]](http://s19.postimage.org/4xpsugu0j/arp9.png)
• Then under the start tab Click on “start sniffing”
![[Image: arp10.png]](http://s19.postimage.org/fypjd8bn7/arp10.png)
• Now On victim Machine When User open any non https website and login there username password is sniffed.
• Eg.When user Open non-https site
![[Image: arp12.png]](http://s19.postimage.org/c3m5anshf/arp12.png)
• Types username and password
![[Image: arp13.png]](http://s19.postimage.org/4owtia6lv/arp13.png)
• We Got the user name And Password Here.
![[Image: arp14.png]](http://s19.postimage.org/yi3tqvv8z/arp14.png)
So That is Called Man in the middle attack we can do same thing in HTTPS service. Next part on HTTPS wait for my next part..
Enjoy The ARP Poisoning..........:headbash:![Wink Wink](https://sinister.ly/images/smilies/set/wink.png)
:dance::wub::bye:
1. What is Sniffing
Ans. Sniffing is a data interception technology. Sniffer is a program that monitor or reading all network traffic passing in and out over a network. Telnet, Relogin, FTP, NNTP, SMTP, HTTP, IMAP that all protocol are vulnerable for sniffing because it send data and password in clear text. Sniffing can be use both the ways legally or illegally like for monitor network traffic, network security and for stealing information like password, files from the network. Sniffing can be done both way one is from command line utility and other is from GUI interface. Sniffing is Used In LAN OR WAN Network. In sniffing we can do
• MITM(man in the middle ATTACK)
• DNS Poisoning
• HTTP and HTTPS Sniffing
• Fake Authentication
So LET’s start With MITM
To intercept Information coming, or going to the router by spoofing your physical and logical Addresses is called MITM.
Now What we want.
1. Backtrack operating System.
2. Ettercap tool
3. Company Network LAN or WAN
So let’s start
• Start Backtrack Machine
• Open Terminal
![[Image: arp.png]](http://s19.postimage.org/xpwkdy1o3/arp.png)
• Type -“ettercap-G”
• Click “sniff”
• Click “unified Sniffing”
![[Image: arp2.png]](http://s19.postimage.org/4c0tycyyb/arp2.png)
![[Image: arp3.png]](http://s19.postimage.org/i6z4gttdf/arp3.png)
• Under hosts tab click “scan for hosts”
![[Image: arp4.png]](http://s19.postimage.org/ubedxt69f/arp4.png)
• After hosts is scaned click on “hosts list”
![[Image: arp6.png]](http://s19.postimage.org/yykfzktmb/arp6.png)
• Then click on router ip Eg.192.168.1.1 and click on “add to target 2”
![[Image: arp6.png]](http://s19.postimage.org/yykfzktmb/arp6.png)
• Then click victim eg.192.168.1.10 which you want to poison click on “add to target 1”
![[Image: arp7.png]](http://s19.postimage.org/g8sgiu0vn/arp7.png)
• Under MITM tab click “arp poisoning”
![[Image: arp8.png]](http://s19.postimage.org/45n4v9ptf/arp8.png)
• Then Click “sniff remote connections”
![[Image: arp9.png]](http://s19.postimage.org/4xpsugu0j/arp9.png)
• Then under the start tab Click on “start sniffing”
![[Image: arp10.png]](http://s19.postimage.org/fypjd8bn7/arp10.png)
• Now On victim Machine When User open any non https website and login there username password is sniffed.
• Eg.When user Open non-https site
![[Image: arp12.png]](http://s19.postimage.org/c3m5anshf/arp12.png)
• Types username and password
![[Image: arp13.png]](http://s19.postimage.org/4owtia6lv/arp13.png)
• We Got the user name And Password Here.
![[Image: arp14.png]](http://s19.postimage.org/yi3tqvv8z/arp14.png)
So That is Called Man in the middle attack we can do same thing in HTTPS service. Next part on HTTPS wait for my next part..
Enjoy The ARP Poisoning..........:headbash:
![Wink Wink](https://sinister.ly/images/smilies/set/wink.png)
![Cool Cool](https://sinister.ly/images/smilies/set/cool.png)