How To

Setting up Ettercap for Man in the Middle Attacks

PenTest Magazine describes a cyber-attack as the following:

Man in the middle attacks (or MITMs) are no different. They’re extremely useful in the art of hacking. By inserting themselves in an exchange between another user and application, the attacker can listen in or mimic one of the parties.

Ettercap Set-Up and Execution for Kali Linux Users

  1. echo 1 > /proc/sys/net/ipv4/ip_forward – enable IP forwarding
  2. leafpad /etc/ettercap/etter.conf – open the .conf file
  3. Under [privs] change ec_uid/gid to read 0 – leave the default comment line
  4. Ctrl+F to locate ‘iptables’ and uncomment/remove the # from the bottom two options
  5. Save changes
  6. ettercap -G – start Ettercap
  7. Choose ‘Sniff’ from toolbar and select ‘Unified Sniffing…’
  8. Run ‘ifconfig’ to get a list of connected interfaces and input it into Ettercap
  9. Ettercap is now in attack mode – select ‘hosts’ and then ‘scan for hosts’
  10. After completion, navigate to ‘hosts’ again and select ‘hosts list’
  11. IP address of the router will be Target 1 (add to target 1)
  12. IP address of victim’s machine will be Target 2 (add to target 2)
  13. Select ‘Mitm’ and then ‘Arp poisoning…’
  14. Checkmark ‘Sniff remote connections’ and select OK
To Top

Pin It on Pinterest

Share This