**[TUT] Sniffing with ETTERCAP (GUI) fully explained(part-2)*** 09-22-2012, 07:49 AM
#1
so lets's start with second part of sniffing in network with ettercap..If you want to what is sniffing and types
Here is first Part of sniffing..
PART 1
Today's topic Is HTTPS Sniffing
So lets start with GUI Mode of ettercap
Everything same as arp poisoning just want to one thing more.
To do this steps is here.
• So we modify the contents of etter.conf file which is located in /etc/dierectory
• Commands are- “nano /etc/etter.conf
![[Image: https1.png]](http://s19.postimage.org/c020ssv77/https1.png)
• Now find “if you use ip tables”
![[Image: https2.png]](http://s19.postimage.org/4lcp0f9bn/https2.png)
• Now un comment “if use ip tables”
![[Image: https3.png]](http://s19.postimage.org/i3o6qgaur/https3.png)
• It will create a fake certificate which most of users will fall for…
• Then type “ctrl+x”
• Press “y” to save exit the terminal.
• Now On victim Machine eg.www.facebook.com
![[Image: https4.png]](http://s19.postimage.org/p85zzhi43/https4.png)
• Victim types username and password then click on proceed anyway.
![[Image: https5.png]](http://s19.postimage.org/dx3cb4b8z/https5.png)
• Here we got the password
![[Image: https6.png]](http://s19.postimage.org/huqm0iy2b/https6.png)
• This is called HTTPS Sniffing
Thanks For Reading..Our Next part is DNS poisoning Wait FOr Next PArt
Made By Anonymous-g33k..
:ok::nono::bye::wub::wacko:
Here is first Part of sniffing..
PART 1
Today's topic Is HTTPS Sniffing
So lets start with GUI Mode of ettercap
Everything same as arp poisoning just want to one thing more.
To do this steps is here.
• So we modify the contents of etter.conf file which is located in /etc/dierectory
• Commands are- “nano /etc/etter.conf
![[Image: https1.png]](http://s19.postimage.org/c020ssv77/https1.png)
• Now find “if you use ip tables”
![[Image: https2.png]](http://s19.postimage.org/4lcp0f9bn/https2.png)
• Now un comment “if use ip tables”
![[Image: https3.png]](http://s19.postimage.org/i3o6qgaur/https3.png)
• It will create a fake certificate which most of users will fall for…
• Then type “ctrl+x”
• Press “y” to save exit the terminal.
• Now On victim Machine eg.www.facebook.com
![[Image: https4.png]](http://s19.postimage.org/p85zzhi43/https4.png)
• Victim types username and password then click on proceed anyway.
![[Image: https5.png]](http://s19.postimage.org/dx3cb4b8z/https5.png)
• Here we got the password
![[Image: https6.png]](http://s19.postimage.org/huqm0iy2b/https6.png)
• This is called HTTPS Sniffing
Thanks For Reading..Our Next part is DNS poisoning Wait FOr Next PArt
Made By Anonymous-g33k..
:ok::nono::bye::wub::wacko: