Network Traffic
Last updated
Was this helpful?
Last updated
Was this helpful?
A MiTM tool:
//Launch GUI #sudo ettercap -G
//Sniff options are Unified - snif it all, and Bridged - only look at traffic between 2 nics
Select your interface
Host -> Scan for hosts //may take a while
Host -> Host list , from here we pick the victims and add them as targets //keep this minimal to not dos ourselves
MiTM -> (select attack)//ARP Poison, ICMP Redirect, Port Stealing, DHCP Spoof
Wireshark libs: (libpcap)(winpcap). Capture filters can be used to only accept packets that fit the filter and display filters can be used to section the captured data.
Wire shark filter syntax: only grab traffic for the host on port 4444
Grab traffic for the cidr: net 10.11.1.0/24 -he also disabled name resolution in the Capture Options for both MAC and Transport resolutions to make things easy to read DISPLAY FILTERS: tcp.port == 21 only show ftp traffic then you can rt-click an event and follow the tcp stream to see the full interaction.