]> git.pld-linux.org Git - packages/ettercap6.git/blame - ettercap-ncurses.patch
- update to 0.6.3.1
[packages/ettercap6.git] / ettercap-ncurses.patch
CommitLineData
449fed60
MM
1diff -uNr ettercap-0.6.3.1.orig/configure.in ettercap-0.6.3.1/configure.in
2--- ettercap-0.6.3.1.orig/configure.in Thu Dec 13 18:05:18 2001
3+++ ettercap-0.6.3.1/configure.in Sun Feb 10 16:19:19 2002
4@@ -339,14 +339,14 @@
5 ncurses_warn=0
6 curses_warn=0
7
8- AC_CHECK_HEADERS(ncurses.h,,ncurses_warn=1)
9+ AC_CHECK_HEADERS(ncurses/ncurses.h,,ncurses_warn=1)
10 AC_CHECK_LIB(ncurses,newpad,,ncurses_warn=1)
11
12 if test $ncurses_warn -ne 1; then
13 AC_DEFINE(HAVE_NCURSES,1)
14 ac_cv_ec_ncurses=yes
15 else
16- AC_CHECK_HEADERS(curses.h,,curses_warn=1)
17+ AC_CHECK_HEADERS(ncurses/curses.h,,curses_warn=1)
18 AC_CHECK_LIB(curses,newpad,,curses_warn=1)
19 AC_CHECK_LIB(curses,mvwgetnstr,,curses_warn=1)
20
21@@ -364,7 +364,7 @@
22 form_warn=0
23
24 if test "$ncurses_warn$curses_warn" = "00"; then
25- AC_CHECK_HEADERS(form.h,,form_warn=1)
26+ AC_CHECK_HEADERS(ncurses/form.h,,form_warn=1)
27 AC_CHECK_LIB(form,form_win,,form_warn=1)
28
29 if test $form_warn -ne 1; then
30@@ -396,12 +396,12 @@
31 ac_cv_ec_debug=yes
32 ;;
33 no) AC_MSG_RESULT(no.)
34- CFLAGS="-O3 -funroll-loops -fomit-frame-pointer -Wall"
35+ CFLAGS="${CFLAGS} -funroll-loops -fomit-frame-pointer -Wall"
36 ac_cv_ec_debug=no
37 ;;
38 esac ],
39 AC_MSG_RESULT(no. disabled by default.)
40- CFLAGS="-O3 -funroll-loops -fomit-frame-pointer -Wall"
41+ CFLAGS="${CFLAGS} -funroll-loops -fomit-frame-pointer -Wall"
42 ac_cv_ec_debug=no
43 )
44 AC_SUBST(DEBUG)
45@@ -600,4 +600,4 @@
46 echo "=================================================="
47 echo
48
49-EC_CHECK_DATE()
50\ No newline at end of file
51+EC_CHECK_DATE()
52diff -uNr ettercap-0.6.3.1.orig/ettercap.8 ettercap-0.6.3.1/ettercap.8
53--- ettercap-0.6.3.1.orig/ettercap.8 Thu Jan 1 01:00:00 1970
54+++ ettercap-0.6.3.1/ettercap.8 Sun Feb 10 16:22:15 2002
1d0ff707 55@@ -0,0 +1,552 @@
56+.\" ettercap -- a ncurses-based sniffer/interceptor utility for switched LAN
57+.\"
58+.\" Copyright (C) 2001 ALoR <alor@users.sourceforge.net>, NaGA <crwm@freemail.it>
59+.\"
60+.\" This program is free software; you can redistribute it and/or modify
61+.\" it under the terms of the GNU General Public License as published by
62+.\" the Free Software Foundation; either version 2 of the License, or
63+.\" (at your option) any later version.
64+.\"
65+.\" This program is distributed in the hope that it will be useful,
66+.\" but WITHOUT ANY WARRANTY; without even the implied warranty of
67+.\" MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
68+.\" GNU General Public License for more details.
69+.\"
70+.\" You should have received a copy of the GNU General Public License
71+.\" along with this program; if not, write to the Free Software
72+.\" Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
73+.de Sp
74+.if n .sp
75+.if t .sp 0.4
76+..
77+.TH ETTERCAP "8" "20010906" "ettercap 0.5.4"
78+.SH NAME
79+.B ettercap 0.5.4 \- A multipurpose sniffer over switched LANs
80+
81+.SH SYNOPSIS
82+.B ettercap
83+[\fIOPTIONS\fR] [\fIHOST:PORT\fR] [\fIHOST:PORT\fR] [\fIMAC\fR] [\fIMAC\fR]
84+
85+.SH DESCRIPTION
86+Ettercap was born as a sniffer for switched LAN (and obviously even "hubbed" one),
87+but during the development process it has gained more and more feature that have
88+changed it to a powerful and flexible tool for man-in-the-middle attacks.
89+It supports active and passive dissection of many protocols (even ciphered ones)
90+and includes many feature for network and host analysis (such as OS fingerprint).
91+.PP
92+It has five sniffing methods:
93+.br
94++ IPBASED, the packets are filtered matching IP:PORT source and IP:PORT dest
95+.br
96++ MACBASED, packets filtered matching the source and dest MAC address. (useful
97+to sniff connections through gateway)
98+.br
99++ ARPBASED, uses arp poisoning to sniff in switched LAN between two hosts
100+(full-duplex m-i-t-m).
101+.br
102++ SMARTARP, uses arp poisoning to sniff in switched LAN from a victim host to all other
103+hosts knowing the entire list of the hosts (full-duplex m-i-t-m).
104+.br
105++ PUBLICARP, uses arp poison to sniff in switched LAN from a victim host to all other
106+hosts (half-duplex).
107+.br
108+With this method the ARP replies are sent in broadcast, but if ettercap has the complete
109+host list (on start up it has scanned the LAN) SMARTARP method is automatically selected,
110+and the arp replies are sent to all the hosts but the victim, avoiding conflicting MAC
111+addresses as reported by win2K.
112+.PP
113+The most relevant ettercap features are:
114+.PP
115+.B Characters injection in an established connection :
116+you can inject character to server (emulating commands) or to client (emulating replies)
117+maintaining the connection alive !!
118+.PP
119+.B SSH1 support :
120+you can sniff User and Pass, and even the data of an SSH1 connection. ettercap is the
121+first software capable to sniff an SSH connection in FULL-DUPLEX
122+.PP
123+.B HTTPS support :
124+you can sniff http SSL secured data... and even if the connection is made through a PROXY
125+.PP
126+.B Plug-ins support :
127+You can create your own plugin using the ettercap's API.
128+.PP
129+.B Password collector for :
130+TELNET, FTP, POP, RLOGIN, SSH1, ICQ, SMB, MySQL, HTTP, NNTP, X11, NAPSTER, IRC, RIP, BGP,
131+SOCKS 5, IMAP 4, VNC (other protocols coming soon...)
132+.PP
133+.B Packet filtering/dropping:
134+You can set up a filter chain that search for a particular string (even hex) in the TCP
135+or UDP payload and replace it with yours or drop the entire packet.
136+.PP
137+.B OS fingerprint:
138+you can fingerprint the OS of the victim host and even its network adapter (it uses the
139+nmap (c) Fyodor database)
140+.PP
141+.B Kill a connection:
142+from the connections list you can kill all the connections you want
143+.PP
144+.B Packet factory:
145+You can create and sent packet forged on the fly. The factory let you to forge from Ethernet
146+header to application level.
147+
148+.PP
149+.SH OPTIONS
150+Options that make sense together can generally be combined. ettercap will warn the user
151+about unsupported option combinations.
152+.TP
153+.B SNIFFING METHODS
154+.TP
155+\fB\-a\fR, \fB\-\-arpsniff\fR
156+ARP BASED sniffing
157+.br
158+This is THE sniffing method for switched LAN, and if you want to use the man-in-the-middle
159+technique you have to use it. In conjunction with the silent mode (-z option) you must
160+specify two IP and two MAC for ARPBASED (full-duplex) or one IP and one MAC for PUBLICARP
161+(half-duplex). in PUBLICARP the ARP replies are sent in broadcast, but if ettercap has
162+the complete host list (on start up it has scanned the LAN) SMARTARP method is automatically
163+selected, and the arp replies are sent to all the hosts but the victim, and an hash table
164+is created to re-route back the packet form victim to client obtaining in this way a full-duplex
165+man in the middle attack.
166+.br
167+Filters that have as action a replacement or a drop, can be used only with ARPBASED
168+sniffing because it is necessary to re-adjust the sequence number in full-duplex in order
169+to maintain the connection alive.
170+.TP
171+\fB\-s\fR, \fB\-\-sniff\fR
172+IP BASED sniffing
173+.br
174+This is the good old style sniffing method. It rocks on "hubbed" LAN, but useless on switched
175+ones. You can choose the target specifying only source, only dest, with or without port, or
176+nothing (to sniff all connections). A special ip "ANY" means from or to every host.
177+.TP
178+\fB\-m\fR, \fB\-\-macsniff\fR
179+MAC BASED sniffing (you must select two host for this)
180+.br
181+Very useful to sniff TCP traffic with remote hosts. On hubbed LANs if you want to sniff a
182+connection through a gateway is useless to specify the victim's ip and the gateway's ip,
183+because the packet are for an external host, not for the gateway. So you can use this method.
184+Simply specify the victim's MAC and the gateway's MAC and you will see all the connections
185+from and to the Internet.
186+
187+
188+.TP
189+.B GENERAL OPTIONS
190+.TP
191+\fB\-N\fR, \fB\-\-simple\fR
192+NON interactive mode (without ncurses)
193+.br
194+This method is useful if you want to launch ettercap from a script or if you already
195+know some informations of your target or if you want to launch ettercap in background
196+collecting data or password for you (in combination with the --quiet option).
197+.br
198+Some features are not available in this method, obviously the ones which requires
199+interaction with the user, such as characters injection. But others (for example filtering)
200+are fully supported, so you can set up ettercap to poison two host (a victim and its gateway)
201+and to filter all its connection on the port 80 and replace some string with others,
202+all its traffic to the Internet will be changed as you wish.
203+.TP
204+\fB\-z\fR, \fB\-\-silent\fR
205+start in silent mode (no arp storm on start up)
206+.br
207+If you want to launch ettercap with a non invasive method (some NIDS may raise a warn
208+if they detects too much arp request). You have to know all the requested data of the
209+target in order to use this options. For example if you want to poison two host, you need
210+the two IP and the two MAC addresses of the victims.
211+If you select ipsniff or macsniff this method is automatically selected, because you don't
212+need to know the list of the host in the LAN.
213+.br
214+To know the entire list of the hosts use "ettercap -Nl", but remember that it is a invasive
215+method.
216+.TP
217+\fB\-b\fR, \fB\-\-broadping\fR
218+use a broadcast ping instead of arp storm on start up.
219+.br
220+this method is less intrusive, but even less accurate. some hosts will not respond at the
221+broadcast ping (es. Windows) so they remain invisible to this method. Useful if you want to
222+scan a LAN with Linux hosts. As usual you can combine this option with --list to have a
223+list of the hosts "ettercap -Nlb"
224+.TP
225+\fB\-D\fR, \fB\-\-delay <n sec>\fR
226+the delay in seconds between the arp replies if you have selected an ARP poison sniffing
227+method. This is useful if you want to be less aggressive in the poisoning. On many OS the
228+default validity interval of the arp cache is more than a minute (on FreeBSD is 1200 sec).
229+.br
230+The default delay value is 30 sec.
231+.TP
232+\fB\-Z\fR, \fB\-\-stormdelay <n usec>\fR
233+the delay in micro-seconds between the arp request on arp storm at start up.
234+This is useful if you want to be less aggressive in the scanning. Many IDS will report
235+massive arp request, but if you send them in a slower rate, they will not report any strange
236+behavior.
237+.br
238+The default delay value is 1500 usec.
239+.TP
240+\fB\-S\fR, \fB\-\-spoof <IP>\fR
241+If you want to elude some IDS, you can specify a spoofed IP used to scan the LAN with
242+arp request. The source MAC can't be spoofed because a well configured switch will block
243+your request.
244+.TP
245+\fB\-H\fR, \fB\-\-hosts <IP1[,IP2][,IP3][,...]>\fR
246+on start up, scan only these hosts.
247+.br
248+this is useful if you want to use an ARP scanning of the LAN but only on certain IPs.
249+so you can benefit from a ARP scan but remaining less invasive.
250+Useful even if you want to do PUBLIC ARP but you want to poison only specific hosts.
251+since with a list PUBLIC ARP is automatically converted to SMARTARP, only these host
252+will be poisoned and you can leave untouched the arp caches of the other hosts.
253+.br
254+the IP list must be in dotted notation and separated by comma (without black spaces
255+between them), you can use wildcards.
256+.br
257+eg: 192.168.0.2? --> from 20 to 29
258+.br
259+ 192.168.0.1* --> host 1, from 10 to 19 and from 100 to 199
260+.TP
261+\fB\-d\fR, \fB\-\-dontresolve\fR
262+don't resolve IPs on start up. this is useful if you experience an insane "Resolving
263+n hostnames..." message on start up. This is due to a very slow DNS in your environment.
264+.TP
265+\fB\-i\fR, \fB\-\-iface <IFACE>\fR
266+network interface to be used for all the operation. you can even specify network aliases
267+in order to scan a subnet with different ip form your current one.
268+.TP
269+\fB\-n\fR, \fB\-\-netmask <NETMASK>\fR
270+the netmask used to scan the LAN. (in dotted notation). the default is your current
271+ifconfig netmask. but your netmask is for example 255.255.0.0 I encourage you to specify
272+a more restrictive one, if you managed to do an ARP scanning on start up.
273+.TP
274+\fB\-e\fR, \fB\-\-etterconf <FILENAME>\fR
275+use the config file instead of command line options
276+.br
277+etter.conf example file is packaged in the tarball, refer to it to know how to write a
278+config file. all the instruction are written in this example. via the conf file you
279+can disable selectively one protocol dissector or move it on one other port.
280+.br
281+command line options and config file can be mixed for much flexibility, but remember
282+that the options in the config file override the command line, so if in etter.conf
283+you have specified IFACE: eth0, and you launch "ettercap -i eth1 -e etter.conf"
284+the selected iface will be eth0.
285+.br
286+NOTE: the "-e etter.conf" options has to be specified after all other options.
287+.TP
288+\fB\-v\fR, \fB\-\-version\fR
289+check for the latest ettercap version.
290+.br
291+All operation are under your control. Every step requires a user confirmation.
292+With this option ettercap will connect to the http://ettercap.sourceforge.net:80 web
293+side and ask for the page /latest.php. then the result are parsed and compared with
294+your current version. If there is a newer version available, ettercap will ask you if
295+you want to wget it. (wget must be in the path).
296+.br
297+If you want to automatically answer yes at all the question add the option -y
298+.TP
299+\fB\-h\fR, \fB\-\-help\fR
300+prints the help screen with a short summary of the available options.
301+
302+
303+
304+.TP
305+.B SILENT MODE OPTIONS (only combined with -N)
306+.TP
307+\fB\-u\fR, \fB\-\-udp\fR
308+sniff only UDP packets (default is TCP).
309+This option is only useful in "simple" mode, if you start ettercap in interactive mode
310+both TCP and UDP are sniffed.
311+.TP
312+\fB\-R\fR, \fB\-\-reverse\fR
313+sniff all the connection but the selected one. This option is useful if you are using
314+ettercap on a remote machine and you want to sniff all the traffic but you connection from
315+local to remote, because including it will sniff even the ettercap output and it will be
316+screwed up...
317+.TP
318+\fB\-p\fR, \fB\-\-plugin <NAME>\fR
319+run the plugin "NAME".
320+.br
321+most plugins need a destination host. simply specify it after plugin name, in fact
322+hosts are parsed on command line as first the DEST and so the SOURCE.
323+.br
324+To have a list of the available plugins use "list" (without quotes) as plugin name.
325+.br
326+More detailed info about plugins and about how to write your own are found in the
327+README.PLUGINS file.
328+.Sp
329+Currently these plugins are shipped with the official distro:
330+.Sp
331+ arpcop -- Report suspicious ARP replies (developed by acelent)
332+.br
333+ banshee -- They kill without discretion...
334+.br
335+ dummy -- Dummy plugin. It does nothing ! (only a template)
336+.br
337+ golem -- nice D.O.S. BE CAREFUL !!
338+.br
339+ leech -- Isolate a host from the LAN
340+.br
341+ lurker -- try to search for other ettercap
342+.br
343+ imp -- Retrieves some Windows names
344+.br
345+ ooze -- Ping a host
346+.br
347+ phantom -- Sniff/Spoof DNS requests
348+.br
349+ shadow -- A very simple SYN/TCP port scanner
350+.br
351+ spectre -- flood a switched LAN with random MAC addresses
352+.br
353+ triton -- Try to discover the LAN's gateway
354+.TP
355+\fB\-l\fR, \fB\-\-list\fR
356+lists all the hosts in the LAN, reporting each MAC address.
357+.br
358+Commonly combined options are -b (for broadcast ping) and -d (don't resolve hostname).
359+.TP
360+\fB\-C\fR, \fB\-\-collect\fR
361+collect all users and password from the hosts specified on command line.
362+.br
363+Password collector are configured in the config file (etter.conf), if you want
364+you can disable them selectively or move them on other port. This is useful if you
365+don't want to sniff SSH connection (the key change alert will raise suspects) but
366+want to sniff all other supported protocols. Or even if you know that a host has the
367+telnet service on port 4567, simply move the telnet dissector on 4567/tcp
368+.TP
369+\fB\-f\fR, \fB\-\-fingerprint <HOST>\fR
370+do OS fingerprinting on HOST.
371+.br
372+This option uses the same database and the same method used by
373+.I nmap (c) Fyodor <fyodor@insecure.org>
374+so I report a piece of its man page :
375+.Sp
376+This option activates remote host identification via TCP/IP fingerprinting. In other
377+words, it uses a bunch of techniques to detect subtleties in the underlying operating
378+system network stack of the computers you are scanning. It uses this information to
379+create a 'fingerprint' which it compares with its database of known OS fingerprints
380+(the nmap-os-fingerprints file) to decide what type of system you are scanning.
381+.Sp
382+the -f options even provides you the vendor of the network adapter of the scanned host.
383+the info are stored in the mac-fingerprints database.
384+.TP
385+\fB\-x\fR, \fB\-\-hexview\fR
386+to dump data in hex mode.
387+.br
388+TIP: while sniffing you can change the visualization mode by hitting 'a' for ascii or 'x' for hex.
389+on line help is recalled by 'h'.
390+.TP
391+\fB\-L\fR, \fB\-\-logtofile\fR
392+if used alone logs all data to specific file(s). it crates a separate file for each connection
393+in the form "YYYYMMDD-P-IP:PORT-IP:PORT.log"
394+.br
395+if used with -C (collector) it creates a file with all the password sniffed in the session in
396+the form "YYYYMMDD-collected-pass.log"
397+.TP
398+\fB\-q\fR, \fB\-\-quiet\fR
399+"demonize" ettercap.
400+.br
401+useful if you want to log all data in background. this options will detach
402+ettercap from the current tty and set it as a demon collecting data to files. it must be
403+combined with -NL (or -NLC) otherwise it has no effects. Obviously the sniffing method
404+is required, so you have to combine it with this option.
405+.TP
406+\fB\-k\fR, \fB\-\-newcert\fR
407+create a new cert file for HTTPS man-in-the-middle.
408+.br
409+useful if you want to create a certfile with social engineered information...
410+.br
411+the new file is created in the current working directory. to permanently substitute the
412+default cert file (etter.sll.crt) you have to overwrite /usr/share/ettercap/etter.ssl.crt
413+.TP
414+\fB\-F\fR, \fB\-\-filter <FILENAME>\fR
415+load the filters chains from FILENAME
416+.br
417+the Filtering chains file is written in pseudo XML format. You can write by hand this
418+file or (better) use the ncurses interface to let ettercap create it (press 'F' in the
419+connection list interface). If you are skilled in XML parsing, you can write your own
420+program to make a filter chain file.
421+.Sp
422+the rules are simple:
423+.Sp
424+If the proto <proto> AND the source port <source> AND the dest port <dest> AND the payload <search>
425+match the rules, after the filter as done its action <action>, it jumps in the chain
426+to the filter id specified in the <goto> field, else it jumps to <elsegoto>.
427+If these field are left blank the chain is interrupted. Source and dest port equal to
428+0 (zero) means ANY port. You can use wildcards in the search string (see README for detail)
429+.Sp
430+NOTE: with this options filter are enabled by default, if you want to
431+disable them on the fly, press "S" (for source) or "D" (for dest) while sniffing
432+.Sp
433+NOTE: on command line the hosts are parsed as "ettercap -F etter.filter DEST SOURCE", so
434+the first host is bound to the dest chain and the second to the source chain.
435+.Sp
436+VERY IMPORTANT: the source chain is applied to data COMING FROM source and NOT GOING TO
437+source. keep this in mind !! the same is for dest...
438+.TP
439+\fB\-c\fR, \fB\-\-check\fR
440+check if you were poisoned by other poisoners in the LAN
441+.TP
442+\fB\-t\fR, \fB\-\-linktype\fR
443+check if you are on a switched LAN or not... Sometimes this discovery method can fail.
444+don't trust it at 100%
445+
446+
447+.SH TARGET SPECIFICATION
448+The targets are parsed on command line in reverse order. The first host is the DEST and the
449+second is the SOURCE. this doesn't care if you are sniffing in ip based mode, because
450+source and dest are ignored, but if you are filtering the connection this is crucial for
451+the binding of the related filter chain.
452+.br
453+The reverse order is due to a more intuitive interface for plugins. because some plugins
454+need the dest host to be specified, it is simpler to type:
455+"ettercap -Np ooze victim" than "ettercap -Np ooze NOONE victim".
456+.br
457+The targets can be specified in dotted notation (192.168.0.1) or with their symbolic name
458+(victim.mynet.org). Only within the -H (--hosts) option you can use wildcards.
459+
460+
461+.SH INTERACTIVE MODE
462+The interactive mode (ncurses mode) is automatically selected if ettercap is launched
463+without the option -N . Explain what you can do with it will take pages and pages... and I'm
464+not a good writer... so if you don't know what can you do in some circumstances, simply
465+press 'H' and a help screen will popup. there you can find a detailed list of all available
466+commands.
467+
468+
469+.SH EXAMPLES
470+Here are some examples of using ettercap.
471+.TP
472+.B ettercap -b
473+.Sp
474+On startup use broadcast ping to scan the LAN instead of ARP request all the
475+subnet IPs.
476+.TP
477+.B ettercap -H "192.168.0.?,192.168.0.3?,192.168.0.2*"
478+.Sp
479+On startup scan only the host 192.168.0.1-9, 192.168.0.30-39, 192.168.0.2,
480+192.168.0.20-29 and 192.168.0.200-255.
481+if the PUBLICARP method will be selected only these host will be poisoned.
482+.TP
483+.B ettercap -s 192.168.0.1 192.168.0.2
484+.Sp
485+Enter the interactive mode and sniff only the connections between 192.168.0.1 and 192.168.0.2
486+.TP
487+.B ettercap -Nzs -F etter.filter 192.168.0.1 192.168.0.2
488+.Sp
489+Load filter from etter.filter and activate them on all the connection between 192.168.0.1
490+and 192.168.0.2 . Only Log action will be supported because it is a -s (ipsniffing) method.
491+192.168.0.1 is bound to the dest chain and 192.168.0.2 to the source one.
492+To enable even the replacement and drop actions you have to launch "ettercap -Nza -F
493+etter.filter IP IP MAC MAC"
494+.TP
495+.B ettercap -zs -e etter.conf
496+.Sp
497+Use the ip based sniffing mode and load the other option from the config file (etter.conf).
498+Note that options in the file override command line.
499+.TP
500+.B ettercap -Nzs victim.my.net ANY:80
501+.Sp
502+Sniffs in console mode (non interactive) only the connection to and from "victim.my.net"
503+starting or ending to all other hosts but on port 80 (www). data are dumped in ASCII
504+mode. to dump in HEX mode add the -x option.
505+.TP
506+.B ettercap -NRzs remote.host.net:23 my.local.host.com
507+.Sp
508+Useful to sniffs in console mode (non interactive) all the connection on a remote LAN
509+on which you are executing ettercap. this example will prevent to show your telnet (:23)
510+connection from "my.local.host.com" to "remote.host.net".
511+.TP
512+.B ettercap -Nclt
513+.Sp
514+This will provide you the entire list of hosts in the LAN. Will check if someone is
515+poisoning you and will report its IP. Will tell you if you are on a switched LAN or not.
516+.TP
517+.B ettercap -NCLzs --quiet
518+.Sp
519+This will detach ettercap from console and log to a file all the collected password.
520+Only works if the LAN is hubbed, or if collected password are directed to your host.
521+.TP
522+.B ettercap -NCza -D 100 192.168.0.1 192.168.0.2 55:23:A5:B4:C7:89 00:A3:56:FE:4F:6D
523+.Sp
524+Collect password to stdout on a switched LAN. this will poison the two host 192.168.0.1
525+and 192.168.0.2 each other. The delay between arp replies is set to 100 sec.
526+.TP
527+.B ettercap -Np triton
528+.Sp
529+Launch the plugin "triton" that will try to passively search for the LAN gateway.
530+.TP
531+.B ettercap -Np ooze victim.mynet.org
532+.Sp
533+Launch the plugin "ooze" that will portscan the host "victim.mynet.org" that will be translated
534+with the right IP
535+
536+.SH PLATFORMS
537+Linux 2.0.x 2.2.x 2.4.x
538+.br
539+FreeBSD 4.x
540+.br
541+OpenBSD 2.[789]
542+.br
543+NetBSD 1.5
544+.br
545+Mac OS X (darwin 1.3)
546+
547+
548+.SH FILES
549+/usr/share/ettercap/etter.conf - the config file
550+.br
551+/usr/share/ettercap/etter.filter - the filter chains
552+.br
553+/usr/share/ettercap/etter.ssl.crt - the SSL certificate for HTTPS m-i-t-m
554+.br
555+/usr/share/ettercap/mac-fingerprints - the network adapter vendor database
556+.br
557+/usr/share/ettercap/nmap-os-fingerprints - the nmap (c) Fyodor os fingerprint
558+.br
559+/usr/doc/ettercap-0.5.4/* - the DOCUMENTATION
560+
561+
562+.SH AUTHORS
563+Alberto Ornaghi (ALoR) <alor@users.sourceforge.net>
564+.br
565+Marco Valleri (NaGA) <crwm@freemail.it>
566+
567+
568+.SH AVAILABILITY
569+http://ettercap.sourceforge.net/download/
570+.Sp
571+Or if you want to do an automatic check of the latest version try "ettercap -vy"
572+
573+
574+.SH BUGS
575+Our software never has bugs.
576+.br
577+It just develops random features. ;)
578+.PP
579+.B KNOWN-BUGS
580+.PP
581+- It is better that you don't launch ettercap on a host that is a gateway
582+because it needs to disable ip_forwarding, it may cause problem with routing.
583+.PP
584+- You cannot use plugins on yourself. outgoing link layer packets are not
585+captured by the same socket, so they will be ignored.
586+.PP
587+- While poisoning on a switched LAN, ettercap won't sniff the traffic made
588+by your host to others. the technical reason is: otherwise ettercap will
589+forward your packets two time (and this is not good...) the artistic
590+reason is: why sniffing yourself with a man-in-the-middle method ? use
591+simple sniffing instead ! ;)
592+.PP
593+- While sniffing in Public ARP mode, ettercap can "view" only one way of
594+the connection, so some protocol dissectors can fail...
595+.PP
596+- under X11 resizing the xterm can give a corrupted visualization of the
597+interface. SIGWINCH is *partially* supported.
598+.PP
599+- ettercap doesn't handle fragmented packets... only the first segment
600+will be displayed by the sniffer. However all the fragments are correctly
601+forwarded.
602+.PP
603++ please send bug-report, patches or suggestions to <alor@users.sourceforge.net>
604+or visit http://ettercap.sourceforge.net/forum/ and post it in the BUGS section.
605+.PP
606++ to report a bug, recompile ettercap with 'configure --enable-debug'
607+and attach ettercap_debug.log to the mail in which U explain the problem.
449fed60
MM
608diff -uNr ettercap-0.6.3.1.orig/ettercap.spec ettercap-0.6.3.1/ettercap.spec
609--- ettercap-0.6.3.1.orig/ettercap.spec Thu Jan 1 01:00:00 1970
610+++ ettercap-0.6.3.1/ettercap.spec Sun Feb 10 16:22:15 2002
1d0ff707 611@@ -0,0 +1,40 @@
612+%define prefix /usr
613+
614+Summary: ettercap is a ncurses-based sniffer/interceptor utility
615+Name: ettercap
616+Version: 0.5.4
617+Release: 1
618+Serial: 20010906
619+Packager: ALoR <alor@users.sourceforge.net>
620+Source: http://ettercap.sourceforge.net/download/%{name}-%{version}.tar.gz
621+URL: http://ettercap.sourceforge.net/
622+License: GPL
623+Group: Networking/Utilities
624+Prefix: %{prefix}
625+Buildroot: %{_tmppath}/%{name}-%{version}-root
626+
627+%description
628+ettercap is a multipurpose sniffer/interceptor/logger for switched or "hubbed" LAN.
629+
630+%prep
631+%setup -q
632+
633+%build
634+./configure --prefix=%{prefix} --disable-debug --mandir=%{_mandir}
635+make
636+make plug-ins
637+
638+%install
639+rm -rf $RPM_BUILD_ROOT
640+make install DESTDIR=$RPM_BUILD_ROOT
641+make plug-ins_install DESTDIR=$RPM_BUILD_ROOT
642+
643+%clean
644+rm -rf $RPM_BUILD_ROOT
645+
646+%files
647+%defattr(-,root,root)
648+%{_mandir}/man8/*
649+%doc COPYING README README.PLUGINS HISTORY CHANGELOG AUTHORS TODO THANKS KNOWN-BUGS PORTINGS
650+%{prefix}/bin/*
651+%{prefix}/share/ettercap/*
This page took 0.185888 seconds and 4 git commands to generate.