• Kali Linux configuration "Ettercap"


    Xx_Instroduction

    • Ettercap is a man-in-the-middle attack(MITM) tool,kali take this tool,so,use front we are need configuration that configuration file.

    Ax_Open

    • vi /etc/ettercap/etter.conf
    • 1 ############################################################################
      2 ##
      
      3 # ettercap -- etter.conf -- configuration file #
      4 # #
      5 # Copyright (C) ALoR & NaGA #
      6 # #
      7 # This program is free software; you can redistribute it and/or modify #
      8 # it under the terms of the GNU General Public License as published by #
      9 # the Free Software Foundation; either version 2 of the License, or #
      10 # (at your option) any later version. #
      11 # #
      12 # #
      13 ############################################################################
      14
      15 [privs]
      16 ec_uid = 0 #nobody is the default
      17 #haha userid and groupid gaiwei 0
      18 ec_gid = 0 # nobody is the default
      19
      20 [mitm]
      21 arp_storm_delay = 10 # milliseconds
      22 arp_poison_smart = 0 # boolean
      23 arp_poison_warm_up = 1 # seconds
      24 arp_poison_delay = 10 # seconds
      25 arp_poison_icmp = 1 # boolean
      26 arp_poison_reply = 1 # boolean
      27 arp_poison_request = 0 # boolean
      28 arp_poison_equal_mac = 1 # boolean
      29 dhcp_lease_time = 1800 # seconds
      30 port_steal_delay = 10 # seconds
      31 port_steal_send_delay = 2000 # microseconds
      32 ndp_poison_warm_up = 1 # seconds
      33 ndp_poison_delay = 5 # seconds
      34 ndp_poison_send_delay = 1500 # microseconds
      35 ndp_poison_icmp = 1 # boolean
      36 ndp_poison_equal_mac = 1 # boolean
      37 icmp6_probe_delay = 3 # seconds
      38
      39 [connections]
      40 connection_timeout = 300 # seconds
      41 connection_idle = 5 # seconds
      42 connection_buffer = 10000 # bytes
      43 connect_timeout = 5 # seconds
      44
      45 [stats]
      46 sampling_rate = 50 # number of packets
      47
      48 [misc]
      49 close_on_eof = 1 # boolean value
      50 store_profiles = 1 # 0 = disabled; 1 = all; 2 = local; 3 = remote
      51 aggressive_dissectors = 1 # boolean value
      52 skip_forwarded_pcks = 1 # boolean value
      53 checksum_check = 0 # boolean value
      54 submit_fingerprint = 0 # boolean valid (set if you want ettercap to submit unknown finger prints)
      55 checksum_warning = 0 # boolean value (valid only if checksum_check is 1)
      56 sniffing_at_startup = 1 # boolean value
      57
      58 ############################################################################
      59 #
      60 # You can specify what DISSECTORS are to be enabled or not...
      61 #
      62 # e.g.: ftp = 21 enabled on port 21 (tcp is implicit)
      63 # ftp = 2345 enabled on non standard port
      64 # ftp = 21,453 enabled on port 21 and 453
      65 # ftp = 0 disabled
      66 #
      67 # NOTE: some dissectors have multiple default ports, if you specify a new
      68 # one, all the default ports will be overwritten
      69 #
      70 #
      71
      72 #dissector default port
      73
      74 [dissectors]
      75 ftp = 21 # tcp 21
      76 ssh = 22 # tcp 22
      77 telnet = 23 # tcp 23
      78 smtp = 25 # tcp 25
      79 dns = 53 # udp 53
      80 dhcp = 67 # udp 68
      81 http = 80 # tcp 80
      82 ospf = 89 # ip 89 (IPPROTO 0x59)
      83 pop3 = 110 # tcp 110
      84 #portmap = 111 # tcp / udp
      85 vrrp = 112 # ip 112 (IPPROTO 0x70)
      86 nntp = 119 # tcp 119
      87 smb = 139,445 # tcp 139 445
      88 imap = 143,220 # tcp 143 220
      89 snmp = 161 # udp 161
      90 bgp = 179 # tcp 179
      91 ldap = 389 # tcp 389
      92 https = 443 # tcp 443
      93 ssmtp = 465 # tcp 465
      94 rlogin = 512,513 # tcp 512 513
      95 rip = 520 # udp 520
      96 nntps = 563 # tcp 563
      97 ldaps = 636 # tcp 636
      98 telnets = 992 # tcp 992
      99 imaps = 993 # tcp 993
      100 ircs = 994 # tcp 993
      101 pop3s = 995 # tcp 995
      102 socks = 1080 # tcp 1080
      103 radius = 1645,1646 # udp 1645 1646
      104 msn = 1863 # tcp 1863
      105 cvs = 2401 # tcp 2401
      106 mysql = 3306 # tcp 3306
      107 icq = 5190 # tcp 5190
      108 ymsg = 5050 # tcp 5050
      109 mdns = 5353 # udp 5353
      110 vnc = 5900,5901,5902,5903 # tcp 5900 5901 5902 5903
      111 x11 = 6000,6001,6002,6003 # tcp 6000 6001 6002 6003
      112 irc = 6666,6667,6668,6669 # tcp 6666 6667 6668 6669
      113 gg = 8074 # tcp 8074
      114 proxy = 8080 # tcp 8080
      115 rcon = 27015,27960 # udp 27015 27960
      116 ppp = 34827 # special case ;) this is the Net Layer code
      117 TN3270 = 23,992 # tcp 23 992
      118
      119 #
      120 # you can change the colors of the curses GUI.
      121 # here is a list of values:
      122 # 0 Black 4 Blue
      123 # 1 Red 5 Magenta
      124 # 2 Green 6 Cyan
      125 # 3 Yellow 7 White
      126 #
      127 [curses]
      128 color_bg = 0
      129 color_fg = 7
      130 color_join1 = 2
      131 color_join2 = 4
      132 color_border = 7
      133 color_title = 3
      134 color_focus = 6
      135 color_menu_bg = 4
      136 color_menu_fg = 6
      137 color_window_bg = 4
      138 color_window_fg = 7
      139 color_selection_bg = 6
      140 color_selection_fg = 6
      141 color_error_bg = 1
      142 color_error_fg = 3
      143 color_error_border = 3
      144
      145 #
      146 # This section includes all the configurations that needs a string as a
      147 # parmeter such as the redirect command for SSL mitm attack.
      148 #
      149 [strings]
      150
      151 # the default encoding to be used for the UTF-8 visualization
      152 utf8_encoding = "ISO-8859-1"
      153
      154 # the command used by the remote_browser plugin
      155 remote_browser = "xdg-open http://%host%url"
      156
      157
      158 #####################################
      159 # redir_command_on/off
      160 #####################################
      161 # you must provide a valid script for your operating system in order to have
      162 # the SSL dissection available
      163 # note that the cleanup script is executed without enough privileges (because
      164 # they are dropped on startup). so you have to either: provide a setuid program
      165 # or set the ec_uid to 0, in order to be sure the cleanup script will be
      166 # executed properly
      167 # NOTE: the script must fit into one line with a maximum of 255 characters
      168
      169 #---------------
      170 # Linux
      171 #---------------
      172
      173 # if you use ipchains:
      174 #redir_command_on = "ipchains -A input -i %iface -p tcp -s 0/0 -d 0/0 %port -j REDIRECT %rport"
      175 #redir_command_off = "ipchains -D input -i %iface -p tcp -s 0/0 -d 0/0 %port -j REDIRECT %rport"
      176
      177 # if you use iptables:
      178 redir_command_on = "iptables -t nat -A PREROUTING -i %iface -p tcp --dport %port -j REDIRECT --to-port %rport"
      179 redir_command_off = "iptables -t nat -D PREROUTING -i %iface -p tcp --dport %port -j REDIRECT --to-port %rport"
      180
      181 #---------------
      182 # Mac Os X
      183 #---------------
      184
      185 # quick and dirty way:
      186 #redir_command_on = "ipfw -q add set %set fwd 127.0.0.1,%rport tcp from any to any %port in via %iface"
      187 #redir_command_off = "ipfw -q delete set %set"
      188
      189 # a better solution is to use a script that keeps track of the rules interted
      190 # and then deletes them on exit:
      191
      192 # redir_command_on:
      193 # ----- cut here -------
      194 # #!/bin/sh
      195 # if [ -a "/tmp/osx_ipfw_rules" ]; then
      196 # ipfw -q add head -n 1 osx_ipfw_rules fwd 127.0.0.1,1 tcp from any to any2 in via 3 197 # else 198 # ipfw add fwd 127.0.0.1,1 tcp from any to any 2 in via3 | cut -d " " -f 1 >> /tmp/osx_ipfw_rules
      199 # fi
      200 # ----- cut here -------
      201
      202 # redir_command_off:
      203 # ----- cut here -------
      204 # #!/bin/sh
      205 # if [ -a "/tmp/osx_ipfw_rules" ]; then
      206 # ipfw -q delete head -n 1 /tmp/osx_ipfw_rules
      207 # rm -f /tmp/osx_ipfw_rules
      208 # fi
      209 # ----- cut here -------
      210
      211 #---------------
      212 # FreeBSD
      213 #---------------
      214
      215 # Before OF can be used, make sure the kernel module has been loaded by
      216 # kldstat | grep pf.ko. If the rusult is empty, you can load it by
      217 # kldload pf.ko or add 'pf_enable="YES"' to the /etc/rc.conf and reboot.
      218
      219 # Check if the PF status is enabled by
      220 # pfctl -si | grep Status | awk '{print $2;}'. If "Disabled", enable it with
      221 # pfctl -e.
      222
      223 #redir_command_on = "(pfctl -sn 2> /dev/null; echo 'rdr pass on %iface inet proto tcp from any to any port %port -> localhost port %rport') | pfctl -f - 2> /dev/null"
      224 #redir_command_off = "pfctl -Psn 2> /dev/null | grep -v %port | pfctl -f - 2> /dev/null"
      225
      226
      227 #---------------
      228 # Open BSD
      229 #---------------
      230
      231 # unfortunately the pfctl command does not accepts direct rules adding
      232 # you have to use a script which executed the following command:
      233
      234 # ----- cut here -------
      235 # #!/bin/sh
      236 # rdr pass on 1 inet proto tcp from any to any port2 -> localhost port $3 | pfctl -a sslsniff -f -
      237 # ----- cut here -------
      238
      239 # it's important to remember that you need "rdr-anchor sslsniff" in your
      240 # pf.conf in the TRANSLATION section.
      241
      242 #redir_command_on = "the_script_described_above %iface %port %rport"
      243 #redir_command_off = "pfctl -a sslsniff -Fn"
      244
      245 # also, if you create a group called "pfusers" and have EC_GID be that group,
      246 # you can do something like:
      247 # chgrp pfusers /dev/pf
      248 # chmod g+rw /dev/pf
      249 # such that all users in "pfusers" can run pfctl commands; thus allowing non-root
      250 # execution of redir commands.
      251
      252
      253 ##########
      254 # EOF #
      255 ##########</pre>
      

        

    Bx_Modificati

      • Line 16 and line 18 will userid and groupid value instead 0
      • Line 178 and line 179 do away with "#" ,in this way can pass iptables firewall function transmit part flow.
      • save,close,and ok 

  • 相关阅读:
    hdu 2602 Bone Collector 01背包
    总结
    类--接口 抽象父类 多态 鸭子类型 格式化方法与析构方法 反射 异常处理 自定义异常 断言
    类--组合 继承 super关键字 面向对象的三大性
    面向对象 名称空间 类与对象
    re正则模块 垃圾回收机制
    常用模块--hashlib hmac:加密 xml xlrd xlwt:excel读|写 configparser subprocess
    常用模块-- random shutil shevle logging sys.stdin/out/err
    常用模块-- time os sys 递归 序列化

  • 原文地址:https://www.cnblogs.com/enomothem/p/11628569.html
Copyright © 2020-2023  润新知