
-bash-2.05b# apt-get install sslstrip && sslstrip --help Reading package lists... Done Building dependency tree Reading state information... Done The following NEW packages will be installed: sslstrip 0 upgraded, 1 newly installed, 0 to remove and 12 not upgraded. Need to get 0B/24,6kB of archives. After this operation, 188kB of additional disk space will be used. Selecting previously deselected package sslstrip. (Reading database ... 38855 files and directories currently installed.) Unpacking sslstrip (from .../sslstrip_0.9-0maemo1_all.deb) ... Setting up sslstrip (0.9-0maemo1) ... sslstrip 0.9 by Moxie Marlinspike Usage: sslstrip <options> Options: -w <filename>, --write=<filename> Specify file to log to (optional). -p , --post Log only SSL POSTs. (default) -s , --ssl Log all SSL traffic to and from server. -a , --all Log all SSL and HTTP traffic to and from server. -l <port>, --listen=<port> Port to listen on (default 10000). -f , --favicon Substitute a lock favicon on secure requests. -k , --killsessions Kill sessions in progress. -h Print this help message. -bash-2.05b#
| The Following User Says Thank You to Saturn For This Useful Post: | ||
-bash-2.05b# apt-get install ettercap && ettercap --help
Reading package lists... Done
Building dependency tree
Reading state information... Done
The following extra packages will be installed:
ettercap-common
The following NEW packages will be installed:
ettercap ettercap-common
0 upgraded, 2 newly installed, 0 to remove and 12 not upgraded.
Need to get 0B/497kB of archives.
After this operation, 1544kB of additional disk space will be used.
Do you want to continue [Y/n]? y
WARNING: The following packages cannot be authenticated!
ettercap-common ettercap
Install these packages without verification [y/N]? y
Selecting previously deselected package ettercap-common.
(Reading database ... 38749 files and directories currently installed.)
Unpacking ettercap-common (from .../ettercap-common_1%3a0.7.3-2maemo1_armel.deb) ...
Selecting previously deselected package ettercap.
Unpacking ettercap (from .../ettercap_1%3a0.7.3-2maemo1_armel.deb) ...
Setting up ettercap-common (1:0.7.3-2maemo1) ...
Setting up ettercap (1:0.7.3-2maemo1) ...
ettercap NG-0.7.3 copyright 2001-2004 ALoR & NaGA
Usage: ettercap [OPTIONS] [TARGET1] [TARGET2]
TARGET is in the format MAC/IPs/PORTs (see the man for further detail)
Sniffing and Attack options:
-M, --mitm <METHOD:ARGS> perform a mitm attack
-o, --only-mitm don't sniff, only perform the mitm attack
-B, --bridge <IFACE> use bridged sniff (needs 2 ifaces)
-p, --nopromisc do not put the iface in promisc mode
-u, --unoffensive do not forward packets
-r, --read <file> read data from pcapfile <file>
-f, --pcapfilter <string> set the pcap filter <string>
-R, --reversed use reversed TARGET matching
-t, --proto <proto> sniff only this proto (default is all)
User Interface Type:
-T, --text use text only GUI
-q, --quiet do not display packet contents
-s, --script <CMD> issue these commands to the GUI
-C, --curses use curses GUI
-G, --gtk use GTK+ GUI
-D, --daemon daemonize ettercap (no GUI)
Logging options:
-w, --write <file> write sniffed data to pcapfile <file>
-L, --log <logfile> log all the traffic to this <logfile>
-l, --log-info <logfile> log only passive infos to this <logfile>
-m, --log-msg <logfile> log all the messages to this <logfile>
-c, --compress use gzip compression on log files
Visualization options:
-d, --dns resolves ip addresses into hostnames
-V, --visual <format> set the visualization format
-e, --regex <regex> visualize only packets matching this regex
-E, --ext-headers print extended header for every pck
-Q, --superquiet do not display user and password
General options:
-i, --iface <iface> use this network interface
-I, --iflist show all the network interfaces
-n, --netmask <netmask> force this <netmask> on iface
-P, --plugin <plugin> launch this <plugin>
-F, --filter <file> load the filter <file> (content filter)
-z, --silent do not perform the initial ARP scan
-j, --load-hosts <file> load the hosts list from <file>
-k, --save-hosts <file> save the hosts list to <file>
-W, --wep-key <wkey> use this wep key to decrypt wifi packets
-a, --config <config> use the alterative config file <config>
Standard options:
-U, --update updates the databases from ettercap website
-v, --version prints the version and exit
-h, --help this help screen
-bash-2.05b#
| The Following User Says Thank You to haffid For This Useful Post: | ||
| The Following 2 Users Say Thank You to g0r For This Useful Post: | ||
| The Following User Says Thank You to carbonjha For This Useful Post: | ||