I installed ettercap-ng: sudo port install ettercap-ng, everything worked properly. I run the command: sudo port search ettercap, I found 2 packages: ettercap and ettercap-ng. It was the first time I used this system and I was pretty impressed by its effectiveness. After couple of googling and tests, I finally decided to install ettercap with MacPorts. Then I run the make command which stuck for a problem with libtool. Everything worked properly and I had a nice output telling ettercap has been configured. Since I wanted to do an article, I wanted to get GTK+ to illustrate it with printscreens and describe the application in a manner that anyone could uses and understands it. configure but it stopped because GTK+ was not installed so I downloaded it. I already had the required libraries installed so I directly downloaded the source code of the version 0.7.4. The first issue was to install it on my OS X Lion. It supports active and passive dissection of many protocols (even ciphered ones) and includes many feature for network and host analysis. It features sniffing of live connections, content filtering on the fly and many other interesting tricks. Ettercap is a free and open-source tool for man in the middle (MITM) attack on LAN. For the tutorial about the MTM attack, I started an article in the Sec IT’s wiki about Ettercap.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |