ettercap

Ettercap is a network security tool used for sniffing, intercepting, and manipulating network traffic, allowing for various types of attacks and analysis.

Ettercap is a powerful and versatile network security tool that is widely used by security professionals and hackers alike for various purposes. It is an open-source and free tool that is available for Windows, Linux, and macOS operating systems.

The tool is primarily used for sniffing, intercepting, and manipulating network traffic. This allows security professionals to perform various types of attacks, including man-in-the-middle (MITM) attacks, password sniffing, and session hijacking. Ettercap can also be used for network mapping, network scanning, and vulnerability analysis.

One of the most significant features of Ettercap is its ability to perform MITM attacks. This allows attackers to intercept and view the communication between two parties on the network, modify the content of the communication, or even inject their own traffic. Ettercap makes it easy to carry out these attacks by providing a user-friendly interface and a wide range of options for customizing the attack.

Another essential feature of Ettercap is its ability to sniff passwords from various protocols, such as HTTP, FTP, Telnet, and SSH. This is particularly useful in situations where security professionals need to test the security of a network by simulating an attack on a user's credentials.

Ettercap also includes a packet filter that can be used to block or redirect specific packets on the network. This can be used to prevent unwanted traffic, such as spam or malware, from entering the network, or to redirect traffic to a different location, such as a honeypot.

In addition to these features, Ettercap also supports plugins that extend its functionality even further. These plugins can be used to add new protocols, filters, or attacks to the tool, making it even more versatile.

Despite its power and usefulness, Ettercap can be a dangerous tool in the hands of malicious actors. It is, therefore, important for security professionals to use it responsibly and only in controlled environments where the potential impact of its use can be minimized.

In conclusion, Ettercap is a highly capable and versatile network security tool that provides security professionals with a wide range of features for testing the security of a network. Its ability to perform MITM attacks, sniff passwords, and filter packets makes it an indispensable tool for security testing and analysis.

Packages and Binaries:

ettercap-common

Ettercap supports active and passive dissection of many protocols (even encrypted ones) and includes many feature for network and host analysis.

Data injection in an established connection and filtering (substitute or drop a packet) on the fly is also possible, keeping the connection synchronized.

Many sniffing modes are implemented, for a powerful and complete sniffing suite. It is possible to sniff in four modes: IP Based, MAC Based, ARP Based (full-duplex) and PublicARP Based (half-duplex).

Ettercap also has the ability to detect a switched LAN, and to use OS fingerprints (active or passive) to find the geometry of the LAN.

This package contains the Common support files, configuration files, plugins, and documentation. You must also install either ettercap-graphical or ettercap-text-only for the actual GUI-enabled or text-only ettercap executable, respectively.

Installed size: 2.45 MB How to install: sudo apt install ettercap-common

Dependencies:
  • ethtool

  • geoip-database

  • libbsd0

  • libc6

  • libcurl4

  • libgeoip1

  • libluajit-5.1-2 | libluajit2-5.1-2

  • libnet1

  • libpcap0.8

  • libpcre2-8-0

  • libssl3

  • zlib1g


ettercap-graphical

Ettercap supports active and passive dissection of many protocols (even encrypted ones) and includes many feature for network and host analysis.

Data injection in an established connection and filtering (substitute or drop a packet) on the fly is also possible, keeping the connection synchronized.

Many sniffing modes are implemented, for a powerful and complete sniffing suite. It is possible to sniff in four modes: IP Based, MAC Based, ARP Based (full-duplex) and PublicARP Based (half-duplex).

Ettercap also has the ability to detect a switched LAN, and to use OS fingerprints (active or passive) to find the geometry of the LAN.

This package contains the ettercap GUI-enabled executable.

Installed size: 605 KB How to install: sudo apt install ettercap-graphical

Dependencies:
  • ettercap-common

  • libbsd0

  • libc6

  • libgdk-pixbuf-2.0-0

  • libglib2.0-0

  • libgtk-3-0

  • libncurses6

  • libpcre2-8-0

  • libtinfo6

  • pkexec

  • zlib1g

ettercap

Multipurpose sniffer/content filter for man in the middle attacks


ettercap-pkexec

Graphical pkexec-based launcher for ettercap


etterfilter

Filter compiler for ettercap content filtering engine


etterlog

Log analyzer for ettercap log files


ettercap-text-only

Ettercap supports active and passive dissection of many protocols (even encrypted ones) and includes many feature for network and host analysis.

Data injection in an established connection and filtering (substitute or drop a packet) on the fly is also possible, keeping the connection synchronized.

Many sniffing modes are implemented, for a powerful and complete sniffing suite. It is possible to sniff in four modes: IP Based, MAC Based, ARP Based (full-duplex) and PublicARP Based (half-duplex).

Ettercap also has the ability to detect a switched LAN, and to use OS fingerprints (active or passive) to find the geometry of the LAN.

This package contains the ettercap text-mode-only executable.

Installed size: 304 KB How to install: sudo apt install ettercap-text-only

Dependencies:
  • ettercap-common

  • libbsd0

  • libc6

  • libncurses6

  • libpcre2-8-0

  • libtinfo6

  • zlib1g

ettercap

Multipurpose sniffer/content filter for man in the middle attacks


etterfilter

Filter compiler for ettercap content filtering engine


etterlog

Log analyzer for ettercap log files


Updated on: 2023-Mar-08


Last updated

Was this helpful?