ettercap_curses man page on Kali

Man page or keyword search:  
man Server   9211 pages
apropos Keyword Search (all sections)
Output format
Kali logo
[printable version]

ETTERCAP-CURSES(8)					    ETTERCAP-CURSES(8)

NAME
       ettercap - Man page for the Ncurses GUI.

GENERAL DESCRIPTION
       The curses GUI is quite simple and intuitive.
       It  is  menu-driven.  Every  flag  or  function	can be modified/called
       through the upper menu. All user messages are  printed  in  the	bottom
       window.	If you want to see the old messages, you can scroll the window
       buffer by pressing the UP, DOWN, PPAGE, NPAGE keys.  The middle part is
       used to display information or dialogs for the user.

       The  menus can be opened by pressing the relative hotkey. For the menus
       the hotkey is represented by the uppercase initial letter of the	 title
       (e.g.  'S'  for Sniffing, 'T' for Targets). The functions within a menu
       can be called by pressing the hotkey depicted near the function name on
       the  right.  Hotkeys  prefixed  with 'C-' are to be used in conjunction
       with the CTRL key (e.g. 'C-f' means CTRL+f).

       You can switch the focus between the objects on the screen by  pressing
       the  TAB	 key  or  by clicking on it with the mouse (if you are running
       ettercap within an xterm). Mouse events are supported only through  the
       xterm.  You  can use the mouse to select objects, open a menu, choose a
       function, scroll the elevators for the scrolling windows, etc etc.

       When you open multiple windows in the middle part, they	will  overlap.
       Use the TAB key to switch between them. Use CTRL+Q to close the focused
       window.
       You can also use CTRL+Q to close the input dialog if you want to cancel
       the requested input. (i.e. you have selected the wrong function and you
       want to go back).

       To have a quick help on the shortcuts you can use against a  particular
       window press the SPACE key. A help window will be displayed with a list
       of shortcuts that can be used. If the window does not appear, no short‐
       cuts are available.

HOW TO SELECT IT
       To use the ncurses GUI you have to:

       - compile ettercap with ncurses support (obviously)
       - run it with the -C flag

       Passing	the  -C flag is sufficient, but if you want you can pass other
       flags that will be automatically set for the ncurses GUI. You  will  be
       able to override them using the menu to change the options.

ONCE STARTED
       As  soon	 as  ettercap  is  launched  with the Ncurses GUI, you will be
       prompted with multiple choices. The first screen lets you select if you
       want  to open a pcap file or dump the sniffed traffic to a file, if you
       want unified sniffing or bridged one, permits you to set a pcap file on
       the captured traffic and enables you to log all the sniffed data.

       Once  you  have	selected  a  sniffing  method  (from  file, unified or
       bridged) this screen will not be reachable anymore. The only way is  to
       restart ettercap.

       Let's analyze each menu in the start screen:

       File

	      Open...
		     Open  a pcap file and analyze it. All the functionalities
		     available for live sniffing are in place except for those
		     sending  or  forwarding  packets  (mitm  attacks  and  so
		     on...).

	      Dump to file...
		     All the traffic sniffed  by  the  live  capture  will  be
		     dumped  to	 that file. The filters, not the targets, have
		     effects on this file, as all the packets received by pcap
		     will be dumped. The only way to not dump a certain packet
		     is to set a proper pcap filter (see below).

	      Exit
		     Exits from ettercap and returns to the command prompt.

       Sniff

	      Unified sniffing...
		     Choosing this function you will be prompted to select the
		     network  interface	 to be used for sniffing. The first up
		     and running interface is suggested in the input box.  For
		     an	 explanation  of  what	unified	 sniffing is, refer to
		     ettercap(8).
		     TIP: if you use the 'u' hotkey, this step will be skipped
		     and the default interface is automatically selected.

	      Bridged sniffing...
		     After  selecting  the two interfaces to be used, you will
		     enter the Bridged sniffing mode. For  an  explanation  of
		     what bridged sniffing is, refer to ettercap(8).

	      Set pcap filter...
		     Here you can insert a tcpdump-like filter for the captur‐
		     ing process.
		     IMPORTANT: if you manage to use a mitm  attack,  remember
		     that  if  ettercap	 does not see a packet, it will NOT be
		     forwarded. So be sure of what you are doing by setting  a
		     pcap filter.

       Options

	      Unoffensive
		     This  enable/disable  the	unoffensive flag. The asterisk
		     '*' means "the option is enabled". Otherwise  the	option
		     is not enabled.

	      Promisc mode
		     Enable/disable the promisc mode for the live capture on a
		     network interface.	 This is an "asterisk-option"  as  the
		     unoffensive one.

	      Set netmask
		     Use  the  specified netmask instead of the one associated
		     with the current iface. This option is useful if you have
		     the  NIC  with  an	 associated netmask of class B and you
		     want to scan (with the arp scan) only a C class.

THE INTERESTING PART
       Once you have selected an offline sniffing or a live capture, the upper
       menu is modified and you can start to do the interesting things...
       Some of the following menu are only available in live capture.

       Start

	      Start sniffing
		     Starts  the  sniffing  process depending on what you have
		     selected on startup (live or from file)

	      Stop sniffing
		     Stops the sniffing thread.

	      Exit
		     Returns to your favourite shell ;)

       Targets

	      Current Targets
		     Displays a list of hosts in each TARGET. You  can	selec‐
		     tively remove a host by selecting it and press 'd' or add
		     a new host pressing 'a'. To switch between the two lists,
		     use the ARROWS keys.

	      Select TARGET(s)
		     Lets  you	select	the  TARGET(s)	as explained in etter‐
		     cap(8). The syntax is the same as for  the	 command  line
		     specification.

	      Protocol...
		     You can choose to sniff only TCP, only UDP or both (ALL).

	      Reverse matching
		     Reverse  the  matching of a packet. It is equivalent to a
		     NOT before the target specification.

	      Wipe Targets
		     Restores both TARGETS to ANY/ANY/ANY

       Hosts

	      Hosts list
		     Displays the list of hosts detected through an  ARP  scan
		     or converted from the passive profiles. This list is used
		     by MITM attacks when the ANY target is  selected,	so  if
		     you want to exclude a host from the attack, simply delete
		     it from the list.
		     You can remove a host from the list by pressing 'd',  add
		     it	 to  TARGET1  by  pressing '1' or add it to TARGET2 by
		     pressing '2'.

	      Scan for hosts
		     Perform the ARP scan of the netmask  if  no  TARGETS  are
		     selected.	If  TARGETS  was  specified  it only scans for
		     those hosts.

	      Load from file...
		     Loads the hosts list from a file  previously  saved  with
		     "save to file" or hand crafted.

	      Save to file...
		     Save the current hosts list to a file.

       View

	      Connections
		     Displays the connection list. To see detailed information
		     about a connection press 'd', or press 'k' to kill it. To
		     see  the traffic for a specific connection, select it and
		     press enter. Once the two-panel  interface	 is  displayed
		     you  can move the focus with the arrow keys. Press 'j' to
		     switch between joined and split visualization. Press  'k'
		     to kill the connection. Press 'y' to inject interactively
		     and 'Y' to inject a file. Note that it is important which
		     panel  has the focus as the injected data will be sent to
		     that address.
		     HINT:  connections	 marked	 with  an   asterisk   contain
		     account(s) information.

	      Profiles
		     Diplays  the passive profile hosts list. Selecting a host
		     will display the relative details (including account with
		     user and pass for that host).
		     You  can  convert the passive profile list into the hosts
		     list by pressing 'c'.  To purge remote hosts, press  'l'.
		     To	 purge	local  hosts, press 'r'. You can also dump the
		     current profile to a file by  pressing  'd';  the	dumped
		     file can be opened with etterlog(8).
		     HINT: profiles marked with an asterisk contain account(s)
		     information.

	      Statistics
		     Displays some statistics about the sniffing process.

	      Resolve IP addresses
		     Enables DNS resolution for all the	 sniffed  IP  address.
		     CAUTION:  this  will extremely slow down ettercap. By the
		     way the passive  dns  resolution  is  always  active.  It
		     sniffs  dns  replies and stores them in a cache. If an ip
		     address is present in that cache, it  will	 be  automati‐
		     cally resolved. It is dns resolution for free... ;)

	      Visualization method
		     Change  the  visualization	 method	 for the sniffed data.
		     Available methods: ascii, hex, ebcdic, text, html.

	      Visualization regex
		     Set the visualization regular  expression.	 Only  packets
		     matching  this  regex will be displayed in the connection
		     data window.

	      Set the WiFi key
		     Set the WiFi key used to decrypt WiFi encrypted  packets.
		     See ettercap(8) for the format of the key.

       Mitm

	      [...]  For  each type of attack, a menu entry is displayed. Sim‐
		     ply select the attack you want  and  fill	the  arguments
		     when  asked.  You	can activate more than one attack at a
		     time.

	      Stop mitm attack(s)
		     Stops all the mitm attacks currently active.

       Filters

	      Load a filter...
		     Load a precompiled filter file. The file must be compiled
		     with etterfilter(8) before it can be loaded.

	      Stop filtering
		     Unload the filter and stop filtering the connections.

       Logging

	      Log all packets and infos...
		     Given a file name, it will create two files: filename.eci
		     (for information about hosts) and filename.ecp  (for  all
		     the  interesting  packets).  This	is  the same as the -L
		     option.

	      Log only infos...
		     This is used only to sniff information about hosts	 (same
		     as the -l option).

	      Stop logging info
		     Come on... it is self explanatory.

	      Log user messages...
		     Will  log all the messages appearing in the bottom window
		     (same as -m option).

	      Compressed file
		     Asterisk-option to control whether	 or  not  the  logfile
		     should be compressed.

       Plugins

	      Manage the plugins
		     Opens  the	 plugin	 management  window.  You can select a
		     plugin and	 activate  it  by  pressing  'enter'.  Plugins
		     already  active  can  be  recognized  by  the  [1] symbol
		     instead of [0]. If you select an active plugin,  it  will
		     be deactivated.

	      Load a plugin...
		     You  can  load  a	plugin file that is not in the default
		     search path. (remember that you  can  browse  directories
		     with EC_UID permissions).

ORIGINAL AUTHORS
       Alberto Ornaghi (ALoR) <alor@users.sf.net>
       Marco Valleri (NaGA) <naga@antifork.org>

PROJECT STEWARDS
       Emilio Escobar (exfil)  <eescobar@gmail.com>
       Eric Milam (Brav0Hax)  <jbrav.hax@gmail.com>

OFFICIAL DEVELOPERS
       Mike Ryan (justfalter)  <falter@gmail.com>
       Gianfranco Costamagna (LocutusOfBorg)  <costamagnagianfranco@yahoo.it>
       Antonio Collarino (sniper)  <anto.collarino@gmail.com>
       Ryan Linn   <sussuro@happypacket.net>
       Jacob Baines   <baines.jacob@gmail.com>

CONTRIBUTORS
       Dhiru Kholia (kholia)  <dhiru@openwall.com>
       Alexander Koeppe (koeppea)  <format_c@online.de>
       Martin Bos (PureHate)  <purehate@backtrack.com>
       Enrique Sanchez
       Gisle Vanem  <giva@bgnett.no>
       Johannes Bauer  <JohannesBauer@gmx.de>
       Daten (Bryan Schneiders)	 <daten@dnetc.org>

SEE ALSO
       ettercap(8)	ettercap_plugins(8)	etterlog(8)	etterfilter(8)
       etter.conf(5) ettercap-pkexec(8)

ettercap 0.8.2						    ETTERCAP-CURSES(8)
[top]

List of man pages available for Kali

Copyright (c) for man pages and the logo by the respective OS vendor.

For those who want to learn more, the polarhome community provides shell access and support.

[legal] [privacy] [GNU] [policy] [cookies] [netiquette] [sponsors] [FAQ]
Tweet
Polarhome, production since 1999.
Member of Polarhome portal.
Based on Fawad Halim's script.
....................................................................
Vote for polarhome
Free Shell Accounts :: the biggest list on the net