
Looking in Wireshark, I can see the GET immediately after the TCP handshake. If you're not catching the DNS or HTTP request specifically before the login that was captured, the easiest way to determine which site on a specific IP was being visited would be opening up the packet capture with a tool like Wireshark, using a filter for the IP, then looking at the actual web traffic for the site's name. These days, many sites can be hosted on one IP or virtual server. I changed the data above and of course most sites these days are hopefully forcing encrypted logins. If you didn't run this with ettercap originally, you can also run it on a saved packet capture.ħ4.125.93.191 TCP 80 USER: fakeuser PASS: fakepasswd Given a LOGFILE, ettercap will create LOGFILE.ecp (for packets) With this option,Īll packets sniffed by ettercap will be logged, together withĪll the passive info (host info + user & pass) it can collect. These files can be parsedīy etterlog(8) to extract human readable data. Ettercap also has an interesting utility to automatically grab usernames and passwords. You can also of course use various tools including ettercap with the "-w" option to write traffic to a file and review at my leisure to look for interesting data. I've seen the typical sites like Facebook, Amazon, Akamai, and LLNW, but also more interesting sites that are easily identifiable as VPN concentrators, banks, and more. You can also get a quick idea if there are particular hosts getting a lot of traffic activity. If you are seeing typical non-broadcast traffic like HTTP, HTTPS, that's an indicator that you're successfully ARP poisoning. How do we know if it's actually working? If you see non-broadcast traffic destined for other hosts, it will be obvious and you will know you're successfully sniffing all the traffic.Īnother fun way is by opening etherape to see a realtime visualization of the traffic. Once you run the command, ettercap should enumerate hosts and you will start seeing a bunch of traffic information scrolling through your console. The curses interface is actually pretty nice. There is also a curses-based interface, "-C", and GTK with "-G" though it has always seemed less reliable to me than the others. The "-T" tells ettercap to use the text interface, which is still interactive. You can also use "// //" to designate ARP poisoning no matter what source and destination ettercap sees. To sniff the whole subnet, I'll want to do some ARP poisoning to send all traffic to/from the default route through my system. I am not advocating this type of thing on a public network, and ARP poisoning or other attacks often fall afoul of terms of service for public and private networks, and may even be illegal in some jurisdictions.ĭestination Gateway Genmask Flags Metric Ref Use Ifaceġ0.71.0.0 0.0.0.0 255.255.255.0 U 2 0 0 wlan0
#ETTERCAP FOR WINDOWS 10 HOW TO#
Ettercap is certainly nothing new, and there is plenty of documentation around to see how to use it, but I was sitting here goofing around and decided to record my results.
