View Single Post
Posts: 458 | Thanked: 783 times | Joined on Jan 2010 @ France
#1
Hi all,

As requested by mr_pingu here is my first attempt to package the latest version of Ettercap NG :

Ettercap NG :

Ettercap is a comprehensive suite for man in the middle attacks.

Overview :

It features sniffing of live connections, content filtering on the fly and many other interesting tricks. It supports active and passive dissection of many protocols and includes many features for network and host analysis.

Homepage :

http://ettercap.sourceforge.net/

Download packages from extra-devel :

Activate all repositories following this tutorial : Repositories Activation

Then, as usual, as root, install with :

Code:
-bash-2.05b# apt-get install ettercap && ettercap --help
Reading package lists... Done
Building dependency tree       
Reading state information... Done
The following packages were automatically installed and are no longer required:
  dsniff libssl0.9.7 libnet0
Use 'apt-get autoremove' to remove them.
The following extra packages will be installed:
  ettercap-common
The following NEW packages will be installed:
  ettercap ettercap-common
0 upgraded, 2 newly installed, 0 to remove and 19 not upgraded.
Need to get 190kB/504kB of archives.
After this operation, 1561kB of additional disk space will be used.
Do you want to continue [Y/n]? y
Get:1 http://repository.maemo.org fremantle/free ettercap 1:0.7.4.1-1maemo0 [190kB]
Fetched 190kB in 0s (285kB/s)
Selecting previously deselected package ettercap-common.
(Reading database ... 47379 files and directories currently installed.)
Unpacking ettercap-common (from .../ettercap-common_1%3a0.7.4.1-1maemo0_armel.deb) ...
Selecting previously deselected package ettercap.
Unpacking ettercap (from .../ettercap_1%3a0.7.4.1-1maemo0_armel.deb) ...
Setting up ettercap-common (1:0.7.4.1-1maemo0) ...
Setting up ettercap (1:0.7.4.1-1maemo0) ...

ettercap 0.7.4.1 copyright 2001-2011 ALoR & NaGA


Usage: ettercap [OPTIONS] [TARGET1] [TARGET2]

TARGET is in the format MAC/IPs/PORTs (see the man for further detail)

Sniffing and Attack options:
  -M, --mitm <METHOD:ARGS>    perform a mitm attack
  -o, --only-mitm             don't sniff, only perform the mitm attack
  -B, --bridge <IFACE>        use bridged sniff (needs 2 ifaces)
  -p, --nopromisc             do not put the iface in promisc mode
  -u, --unoffensive           do not forward packets
  -r, --read <file>           read data from pcapfile <file>
  -f, --pcapfilter <string>   set the pcap filter <string>
  -R, --reversed              use reversed TARGET matching
  -t, --proto <proto>         sniff only this proto (default is all)

User Interface Type:
  -T, --text                  use text only GUI
       -q, --quiet                 do not display packet contents
       -s, --script <CMD>          issue these commands to the GUI
  -C, --curses                use curses GUI
  -G, --gtk                   use GTK+ GUI
  -D, --daemon                daemonize ettercap (no GUI)

Logging options:
  -w, --write <file>          write sniffed data to pcapfile <file>
  -L, --log <logfile>         log all the traffic to this <logfile>
  -l, --log-info <logfile>    log only passive infos to this <logfile>
  -m, --log-msg <logfile>     log all the messages to this <logfile>
  -c, --compress              use gzip compression on log files

Visualization options:
  -d, --dns                   resolves ip addresses into hostnames
  -V, --visual <format>       set the visualization format
  -e, --regex <regex>         visualize only packets matching this regex
  -E, --ext-headers           print extended header for every pck
  -Q, --superquiet            do not display user and password

General options:
  -i, --iface <iface>         use this network interface
  -I, --iflist                show all the network interfaces
  -n, --netmask <netmask>     force this <netmask> on iface
  -P, --plugin <plugin>       launch this <plugin>
  -F, --filter <file>         load the filter <file> (content filter)
  -z, --silent                do not perform the initial ARP scan
  -j, --load-hosts <file>     load the hosts list from <file>
  -k, --save-hosts <file>     save the hosts list to <file>
  -W, --wep-key <wkey>        use this wep key to decrypt wifi packets
  -a, --config <config>       use the alterative config file <config>

Standard options:
  -U, --update                updates the databases from ettercap website
  -v, --version               prints the version and exit
  -h, --help                  this help screen


-bash-2.05b#
After successful installation, just use it !!!


Hope you like it ...

A++
 

The Following 14 Users Say Thank You to colin.stephane For This Useful Post: