Xx_Instroduction

  • Ettercap is a man-in-the-middle attack(MITM) tool,kali take this tool,so,use front we are need configuration that configuration file.

Ax_Open

  • vi /etc/ettercap/etter.conf
  • 1 ############################################################################
    2 ## 3 # ettercap -- etter.conf -- configuration file #
    4 # #
    5 # Copyright (C) ALoR & NaGA #
    6 # #
    7 # This program is free software; you can redistribute it and/or modify #
    8 # it under the terms of the GNU General Public License as published by #
    9 # the Free Software Foundation; either version 2 of the License, or #
    10 # (at your option) any later version. #
    11 # #
    12 # #
    13 ############################################################################
    14
    15 [privs]
    16 ec_uid = 0 #nobody is the default
    17 #haha userid and groupid gaiwei 0
    18 ec_gid = 0 # nobody is the default
    19
    20 [mitm]
    21 arp_storm_delay = 10 # milliseconds
    22 arp_poison_smart = 0 # boolean
    23 arp_poison_warm_up = 1 # seconds
    24 arp_poison_delay = 10 # seconds
    25 arp_poison_icmp = 1 # boolean
    26 arp_poison_reply = 1 # boolean
    27 arp_poison_request = 0 # boolean
    28 arp_poison_equal_mac = 1 # boolean
    29 dhcp_lease_time = 1800 # seconds
    30 port_steal_delay = 10 # seconds
    31 port_steal_send_delay = 2000 # microseconds
    32 ndp_poison_warm_up = 1 # seconds
    33 ndp_poison_delay = 5 # seconds
    34 ndp_poison_send_delay = 1500 # microseconds
    35 ndp_poison_icmp = 1 # boolean
    36 ndp_poison_equal_mac = 1 # boolean
    37 icmp6_probe_delay = 3 # seconds
    38
    39 [connections]
    40 connection_timeout = 300 # seconds
    41 connection_idle = 5 # seconds
    42 connection_buffer = 10000 # bytes
    43 connect_timeout = 5 # seconds
    44
    45 [stats]
    46 sampling_rate = 50 # number of packets
    47
    48 [misc]
    49 close_on_eof = 1 # boolean value
    50 store_profiles = 1 # 0 = disabled; 1 = all; 2 = local; 3 = remote
    51 aggressive_dissectors = 1 # boolean value
    52 skip_forwarded_pcks = 1 # boolean value
    53 checksum_check = 0 # boolean value
    54 submit_fingerprint = 0 # boolean valid (set if you want ettercap to submit unknown finger prints)
    55 checksum_warning = 0 # boolean value (valid only if checksum_check is 1)
    56 sniffing_at_startup = 1 # boolean value
    57
    58 ############################################################################
    59 #
    60 # You can specify what DISSECTORS are to be enabled or not...
    61 #
    62 # e.g.: ftp = 21 enabled on port 21 (tcp is implicit)
    63 # ftp = 2345 enabled on non standard port
    64 # ftp = 21,453 enabled on port 21 and 453
    65 # ftp = 0 disabled
    66 #
    67 # NOTE: some dissectors have multiple default ports, if you specify a new
    68 # one, all the default ports will be overwritten
    69 #
    70 #
    71
    72 #dissector default port
    73
    74 [dissectors]
    75 ftp = 21 # tcp 21
    76 ssh = 22 # tcp 22
    77 telnet = 23 # tcp 23
    78 smtp = 25 # tcp 25
    79 dns = 53 # udp 53
    80 dhcp = 67 # udp 68
    81 http = 80 # tcp 80
    82 ospf = 89 # ip 89 (IPPROTO 0x59)
    83 pop3 = 110 # tcp 110
    84 #portmap = 111 # tcp / udp
    85 vrrp = 112 # ip 112 (IPPROTO 0x70)
    86 nntp = 119 # tcp 119
    87 smb = 139,445 # tcp 139 445
    88 imap = 143,220 # tcp 143 220
    89 snmp = 161 # udp 161
    90 bgp = 179 # tcp 179
    91 ldap = 389 # tcp 389
    92 https = 443 # tcp 443
    93 ssmtp = 465 # tcp 465
    94 rlogin = 512,513 # tcp 512 513
    95 rip = 520 # udp 520
    96 nntps = 563 # tcp 563
    97 ldaps = 636 # tcp 636
    98 telnets = 992 # tcp 992
    99 imaps = 993 # tcp 993
    100 ircs = 994 # tcp 993
    101 pop3s = 995 # tcp 995
    102 socks = 1080 # tcp 1080
    103 radius = 1645,1646 # udp 1645 1646
    104 msn = 1863 # tcp 1863
    105 cvs = 2401 # tcp 2401
    106 mysql = 3306 # tcp 3306
    107 icq = 5190 # tcp 5190
    108 ymsg = 5050 # tcp 5050
    109 mdns = 5353 # udp 5353
    110 vnc = 5900,5901,5902,5903 # tcp 5900 5901 5902 5903
    111 x11 = 6000,6001,6002,6003 # tcp 6000 6001 6002 6003
    112 irc = 6666,6667,6668,6669 # tcp 6666 6667 6668 6669
    113 gg = 8074 # tcp 8074
    114 proxy = 8080 # tcp 8080
    115 rcon = 27015,27960 # udp 27015 27960
    116 ppp = 34827 # special case ;) this is the Net Layer code
    117 TN3270 = 23,992 # tcp 23 992
    118
    119 #
    120 # you can change the colors of the curses GUI.
    121 # here is a list of values:
    122 # 0 Black 4 Blue
    123 # 1 Red 5 Magenta
    124 # 2 Green 6 Cyan
    125 # 3 Yellow 7 White
    126 #
    127 [curses]
    128 color_bg = 0
    129 color_fg = 7
    130 color_join1 = 2
    131 color_join2 = 4
    132 color_border = 7
    133 color_title = 3
    134 color_focus = 6
    135 color_menu_bg = 4
    136 color_menu_fg = 6
    137 color_window_bg = 4
    138 color_window_fg = 7
    139 color_selection_bg = 6
    140 color_selection_fg = 6
    141 color_error_bg = 1
    142 color_error_fg = 3
    143 color_error_border = 3
    144
    145 #
    146 # This section includes all the configurations that needs a string as a
    147 # parmeter such as the redirect command for SSL mitm attack.
    148 #
    149 [strings]
    150
    151 # the default encoding to be used for the UTF-8 visualization
    152 utf8_encoding = "ISO-8859-1"
    153
    154 # the command used by the remote_browser plugin
    155 remote_browser = "xdg-open http://%host%url"
    156
    157
    158 #####################################
    159 # redir_command_on/off
    160 #####################################
    161 # you must provide a valid script for your operating system in order to have
    162 # the SSL dissection available
    163 # note that the cleanup script is executed without enough privileges (because
    164 # they are dropped on startup). so you have to either: provide a setuid program
    165 # or set the ec_uid to 0, in order to be sure the cleanup script will be
    166 # executed properly
    167 # NOTE: the script must fit into one line with a maximum of 255 characters
    168
    169 #---------------
    170 # Linux
    171 #---------------
    172
    173 # if you use ipchains:
    174 #redir_command_on = "ipchains -A input -i %iface -p tcp -s 0/0 -d 0/0 %port -j REDIRECT %rport"
    175 #redir_command_off = "ipchains -D input -i %iface -p tcp -s 0/0 -d 0/0 %port -j REDIRECT %rport"
    176
    177 # if you use iptables:
    178 redir_command_on = "iptables -t nat -A PREROUTING -i %iface -p tcp --dport %port -j REDIRECT --to-port %rport"
    179 redir_command_off = "iptables -t nat -D PREROUTING -i %iface -p tcp --dport %port -j REDIRECT --to-port %rport"
    180
    181 #---------------
    182 # Mac Os X
    183 #---------------
    184
    185 # quick and dirty way:
    186 #redir_command_on = "ipfw -q add set %set fwd 127.0.0.1,%rport tcp from any to any %port in via %iface"
    187 #redir_command_off = "ipfw -q delete set %set"
    188
    189 # a better solution is to use a script that keeps track of the rules interted
    190 # and then deletes them on exit:
    191
    192 # redir_command_on:
    193 # ----- cut here -------
    194 # #!/bin/sh
    195 # if [ -a "/tmp/osx_ipfw_rules" ]; then
    196 # ipfw -q add head -n 1 osx_ipfw_rules fwd 127.0.0.1,1 tcp from any to any2 in via 3 197 # else 198 # ipfw add fwd 127.0.0.1,1 tcp from any to any 2 in via3 | cut -d " " -f 1 >> /tmp/osx_ipfw_rules
    199 # fi
    200 # ----- cut here -------
    201
    202 # redir_command_off:
    203 # ----- cut here -------
    204 # #!/bin/sh
    205 # if [ -a "/tmp/osx_ipfw_rules" ]; then
    206 # ipfw -q delete head -n 1 /tmp/osx_ipfw_rules
    207 # rm -f /tmp/osx_ipfw_rules
    208 # fi
    209 # ----- cut here -------
    210
    211 #---------------
    212 # FreeBSD
    213 #---------------
    214
    215 # Before OF can be used, make sure the kernel module has been loaded by
    216 # kldstat | grep pf.ko. If the rusult is empty, you can load it by
    217 # kldload pf.ko or add 'pf_enable="YES"' to the /etc/rc.conf and reboot.
    218
    219 # Check if the PF status is enabled by
    220 # pfctl -si | grep Status | awk '{print $2;}'. If "Disabled", enable it with
    221 # pfctl -e.
    222
    223 #redir_command_on = "(pfctl -sn 2> /dev/null; echo 'rdr pass on %iface inet proto tcp from any to any port %port -> localhost port %rport') | pfctl -f - 2> /dev/null"
    224 #redir_command_off = "pfctl -Psn 2> /dev/null | grep -v %port | pfctl -f - 2> /dev/null"
    225
    226
    227 #---------------
    228 # Open BSD
    229 #---------------
    230
    231 # unfortunately the pfctl command does not accepts direct rules adding
    232 # you have to use a script which executed the following command:
    233
    234 # ----- cut here -------
    235 # #!/bin/sh
    236 # rdr pass on 1 inet proto tcp from any to any port2 -> localhost port $3 | pfctl -a sslsniff -f -
    237 # ----- cut here -------
    238
    239 # it's important to remember that you need "rdr-anchor sslsniff" in your
    240 # pf.conf in the TRANSLATION section.
    241
    242 #redir_command_on = "the_script_described_above %iface %port %rport"
    243 #redir_command_off = "pfctl -a sslsniff -Fn"
    244
    245 # also, if you create a group called "pfusers" and have EC_GID be that group,
    246 # you can do something like:
    247 # chgrp pfusers /dev/pf
    248 # chmod g+rw /dev/pf
    249 # such that all users in "pfusers" can run pfctl commands; thus allowing non-root
    250 # execution of redir commands.
    251
    252
    253 ##########
    254 # EOF #
    255 ##########</pre>

      

Bx_Modificati

    • Line 16 and line 18 will userid and groupid value instead 0
    • Line 178 and line 179 do away with "#" ,in this way can pass iptables firewall function transmit part flow.
    • save,close,and ok

Kali Linux configuration "Ettercap"的更多相关文章

  1. kali linux之窥看女神上网隐私(ettercap+wireshark+zenmap +dsniff)

    作者:小波 http://www.cnblogs.com/xiaobo-Linux/ 无聊就玩了玩,不要干一些坏事哟~~网上也有一些文章关于kali linux的,就实战了一番.kali是用的debi ...

  2. Kali Linux ettercap的使用

    ettercap是执行ARP欺骗嗅探的工具,通常用它来施行中间人攻击. 我还介绍过另一个arp欺骗工具-arpspoof 我使用的是Kali Linux 2.0:在开始使用ettercap之前,先配置 ...

  3. kali Linux 渗透测试 | ettercap图形界面(ARP 欺骗 + DNS欺骗)

    上次我们使用 arpspoof 工具在命令行中完成了 arp 欺骗实验,今天我们用另一种工具 ettercap 工具来实现.ettercap支持图形化操作,对新手非常友好,并且操作非常简单, ette ...

  4. Kali Linux——迈向网络攻防

    自从进入大三的课程后,在已学的高数.线代.数论.概率论.信息论.通信等知识的技术上,开始了网络信息安全.网      络攻防的学习.俗话说得好,磨刀不误砍柴工,开始网络攻防之旅也势必要一个好的工具.然 ...

  5. [原创]kali linux下破解wifi密码以及局域网渗透

    无线破解是进行无线渗透的第一步.破解无线目前只有两种方法:抓包.跑pin. 破解无线方法一:抓包.我是在kali linux下进行的. 将无线网卡的模式调为监听模式. airmon-ng start ...

  6. 教你如何在Kali Linux 环境下设置蜜罐?

    导读 Pentbox是一个包含了许多可以使渗透测试工作变得简单流程化的工具的安全套件.它是用Ruby编写并且面向GNU/Linux,同时也支持Windows.MacOS和其它任何安装有Ruby的系统. ...

  7. Kali Linux渗透基础知识整理(三):漏洞利用

    漏洞利用阶段利用已获得的信息和各种攻击手段实施渗透.网络应用程序漏洞诊断项目的加密通信漏洞诊断是必须执行的.顾名思义,利用漏洞,达到攻击的目的. Metasploit Framework rdeskt ...

  8. kali Linux系列教程之BeFF安装与集成Metasploit

    kali Linux系列教程之BeFF安装与集成Metasploit 文/玄魂 kali Linux系列教程之BeFF安装与集成Metasploit 1.1 apt-get安装方式 1.2 启动 1. ...

  9. Kali Linux Web 渗透测试视频教程—第十四课-arp欺骗、嗅探、dns欺骗、session劫持

    Kali Linux Web 渗透测试视频教程—第十四课-arp欺骗.嗅探.dns欺骗.session劫持 文/玄魂 目录 Kali Linux Web 渗透测试—第十四课-arp欺骗.嗅探.dns欺 ...

随机推荐

  1. ActiveMQ配置策略

    1.消息发送 1.异步发送 消息生产者使用持久(persistent)传递模式发送消息的时候,Producer.send() 方法会被阻塞,直到 broker 发送一个确认消息给生产者,这个确认消息暗 ...

  2. Snack3 一个新的微型JSON框架

    Snack3 一个新的微型JSON框架 一个作品,一般表达作者的一个想法.因为大家想法不同,所有作品会有区别.就做技术而言,因为有很多有区别的框架,所以大家可以选择的框架很丰富. snack3.基于j ...

  3. jeecg培训第一课(代码生成与权限分配)

    问题描述:进口部要完成一票进口报关单的增删改查,操作员张三登录只能增删改张三的报关单,操作员李四登录只能增删改李四的报关单, 部门主管王五登录能查看张三和李四的报关单,但不能修改删除.操作员能提交报关 ...

  4. luogu P4943 密室 |最短路

    题目描述 密室被打开了. 哈利与罗恩进入了密室,他们发现密室由n个小室组成,所有小室编号分别为:1,2,...,n.所有小室之间有m条通道,对任意两个不同小室最多只有一条通道连接,而每通过一条通道都需 ...

  5. [TimLinux] JavaScript 阻止父节点接收子节点事件的方法

    1. 事件 两种类型的事件:触发式.冒泡式 2. 冒泡式 触发式:事件从DOM结构的顶层往下走的事件触发过程: 冒泡式:事件从DOM结构的底层往上走的事件触发过程. 3. 父子节点 当父.子节点同时对 ...

  6. 如何正确的探索 Microsoft Ignite The Tour

    Microsoft Ignite The Tour 是一年一度微软为全球开发者.IT专家.安全专家以及数据专家提供的为期两天,包含众多核心产品的实践性技术培训.2019.12.10-2019.12.1 ...

  7. DRF Django REST framework 之 路由器与版本控制组件(七)

    路由器 一些Web框架提供了用于自动确定应如何将应用程序的URL映射到处理传入请求的逻辑的功能. 而DRF的路由器组件也提供了一种简单,快速且一致的方式将视图逻辑映射到一组URL上. 路由器组件的使用 ...

  8. 超酷3D照片展示效果

    @{ Layout = null; } <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www. ...

  9. JavaScript 逻辑与(&&) 与 逻辑或(||) 运算规则

    逻辑与(&&) 逻辑与(&&)操作可以应用于任何的操作类型,不仅仅是布尔值, 在有一个操作数不是布尔值的情况下,&&操作符就不一定返回布尔值:遵循下面规 ...

  10. java概述和java环境按照,java开发体验

    java概述: Java的发展可以归纳如下的几个阶段. (1)第一阶段(完善期):JDK 1.0 ( 1995年推出)一JDK 1.2 (1998年推出,Java更名为Java 2): (2)第二阶段 ...