🌐ettercap

Ettercap is a network security tool used for sniffing, intercepting, and manipulating network traffic, allowing for various types of attacks and analysis.

Ettercap is a powerful and versatile network security tool that is widely used by security professionals and hackers alike for various purposes. It is an open-source and free tool that is available for Windows, Linux, and macOS operating systems.

The tool is primarily used for sniffing, intercepting, and manipulating network traffic. This allows security professionals to perform various types of attacks, including man-in-the-middle (MITM) attacks, password sniffing, and session hijacking. Ettercap can also be used for network mapping, network scanning, and vulnerability analysis.

One of the most significant features of Ettercap is its ability to perform MITM attacks. This allows attackers to intercept and view the communication between two parties on the network, modify the content of the communication, or even inject their own traffic. Ettercap makes it easy to carry out these attacks by providing a user-friendly interface and a wide range of options for customizing the attack.

Another essential feature of Ettercap is its ability to sniff passwords from various protocols, such as HTTP, FTP, Telnet, and SSH. This is particularly useful in situations where security professionals need to test the security of a network by simulating an attack on a user's credentials.

Ettercap also includes a packet filter that can be used to block or redirect specific packets on the network. This can be used to prevent unwanted traffic, such as spam or malware, from entering the network, or to redirect traffic to a different location, such as a honeypot.

In addition to these features, Ettercap also supports plugins that extend its functionality even further. These plugins can be used to add new protocols, filters, or attacks to the tool, making it even more versatile.

Despite its power and usefulness, Ettercap can be a dangerous tool in the hands of malicious actors. It is, therefore, important for security professionals to use it responsibly and only in controlled environments where the potential impact of its use can be minimized.

In conclusion, Ettercap is a highly capable and versatile network security tool that provides security professionals with a wide range of features for testing the security of a network. Its ability to perform MITM attacks, sniff passwords, and filter packets makes it an indispensable tool for security testing and analysis.

Packages and Binaries:

ettercap-common

Ettercap supports active and passive dissection of many protocols (even encrypted ones) and includes many feature for network and host analysis.

Data injection in an established connection and filtering (substitute or drop a packet) on the fly is also possible, keeping the connection synchronized.

Many sniffing modes are implemented, for a powerful and complete sniffing suite. It is possible to sniff in four modes: IP Based, MAC Based, ARP Based (full-duplex) and PublicARP Based (half-duplex).

Ettercap also has the ability to detect a switched LAN, and to use OS fingerprints (active or passive) to find the geometry of the LAN.

This package contains the Common support files, configuration files, plugins, and documentation. You must also install either ettercap-graphical or ettercap-text-only for the actual GUI-enabled or text-only ettercap executable, respectively.

Installed size: 2.45 MB How to install: sudo apt install ettercap-common

Dependencies:
  • ethtool

  • geoip-database

  • libbsd0

  • libc6

  • libcurl4

  • libgeoip1

  • libluajit-5.1-2 | libluajit2-5.1-2

  • libnet1

  • libpcap0.8

  • libpcre2-8-0

  • libssl3

  • zlib1g


ettercap-graphical

Ettercap supports active and passive dissection of many protocols (even encrypted ones) and includes many feature for network and host analysis.

Data injection in an established connection and filtering (substitute or drop a packet) on the fly is also possible, keeping the connection synchronized.

Many sniffing modes are implemented, for a powerful and complete sniffing suite. It is possible to sniff in four modes: IP Based, MAC Based, ARP Based (full-duplex) and PublicARP Based (half-duplex).

Ettercap also has the ability to detect a switched LAN, and to use OS fingerprints (active or passive) to find the geometry of the LAN.

This package contains the ettercap GUI-enabled executable.

Installed size: 605 KB How to install: sudo apt install ettercap-graphical

Dependencies:
  • ettercap-common

  • libbsd0

  • libc6

  • libgdk-pixbuf-2.0-0

  • libglib2.0-0

  • libgtk-3-0

  • libncurses6

  • libpcre2-8-0

  • libtinfo6

  • pkexec

  • zlib1g

ettercap

Multipurpose sniffer/content filter for man in the middle attacks

:~# ettercap -h

ettercap 0.8.3.1 copyright 2001-2020 Ettercap Development Team


Usage: ettercap [OPTIONS] [TARGET1] [TARGET2]

TARGET is in the format MAC/IP/IPv6/PORTs (see the man for further detail)

Sniffing and Attack options:
  -M, --mitm <METHOD:ARGS>    perform a mitm attack
  -o, --only-mitm             don't sniff, only perform the mitm attack
  -b, --broadcast             sniff packets destined to broadcast
  -B, --bridge <IFACE>        use bridged sniff (needs 2 ifaces)
  -p, --nopromisc             do not put the iface in promisc mode
  -S, --nosslmitm             do not forge SSL certificates
  -u, --unoffensive           do not forward packets
  -r, --read <file>           read data from pcapfile <file>
  -f, --pcapfilter <string>   set the pcap filter <string>
  -R, --reversed              use reversed TARGET matching
  -t, --proto <proto>         sniff only this proto (default is all)
      --certificate <file>    certificate file to use for SSL MiTM
      --private-key <file>    private key file to use for SSL MiTM

User Interface Type:
  -T, --text                  use text only GUI
       -q, --quiet                 do not display packet contents
       -s, --script <CMD>          issue these commands to the GUI
  -C, --curses                use curses GUI
  -D, --daemon                daemonize ettercap (no GUI)
  -G, --gtk                   use GTK+ GUI

Logging options:
  -w, --write <file>          write sniffed data to pcapfile <file>
  -L, --log <logfile>         log all the traffic to this <logfile>
  -l, --log-info <logfile>    log only passive infos to this <logfile>
  -m, --log-msg <logfile>     log all the messages to this <logfile>
  -c, --compress              use gzip compression on log files

Visualization options:
  -d, --dns                   resolves ip addresses into hostnames
  -V, --visual <format>       set the visualization format
  -e, --regex <regex>         visualize only packets matching this regex
  -E, --ext-headers           print extended header for every pck
  -Q, --superquiet            do not display user and password

LUA options:
      --lua-script <script1>,[<script2>,...]     comma-separted list of LUA scripts
      --lua-args n1=v1,[n2=v2,...]               comma-separated arguments to LUA script(s)

General options:
  -i, --iface <iface>         use this network interface
  -I, --liface                show all the network interfaces
  -Y, --secondary <ifaces>    list of secondary network interfaces
  -n, --netmask <netmask>     force this <netmask> on iface
  -A, --address <address>     force this local <address> on iface
  -P, --plugin <plugin>       launch this <plugin> - multiple occurance allowed
      --plugin-list <plugin1>,[<plugin2>,...]       comma-separated list of plugins
  -F, --filter <file>         load the filter <file> (content filter)
  -z, --silent                do not perform the initial ARP scan
  -6, --ip6scan               send ICMPv6 probes to discover IPv6 nodes on the link
  -j, --load-hosts <file>     load the hosts list from <file>
  -k, --save-hosts <file>     save the hosts list to <file>
  -W, --wifi-key <wkey>       use this key to decrypt wifi packets (wep or wpa)
  -a, --config <config>       use the alternative config file <config>

Standard options:
  -v, --version               prints the version and exit
  -h, --help                  this help screen


ettercap-pkexec

Graphical pkexec-based launcher for ettercap


etterfilter

Filter compiler for ettercap content filtering engine

:~# man etterfilter
ETTERFILTER(8)              System Manager's Manual             ETTERFILTER(8)

NAME
       etterfilter - Filter compiler for ettercap content filtering engine

SYNOPSIS
       etterfilter [OPTIONS] FILE

DESCRIPTION
       The etterfilter utility is used to compile source filter files into bi-
       nary filter files that can be interpreted by the JIT interpreter in the
       ettercap(8)  filter  engine. You have to compile your filter scripts in
       order to use them in ettercap. All syntax/parse errors will be  checked
       at compile time, so you will be sure to produce a correct binary filter
       for ettercap.

       GENERAL OPTIONS

       -o, --output <FILE>
              you can specify the output file for a source filter file. By de-
              fault the output is filter.ef.

       -t, --test <FILE>
              you  can analyze a compiled filter file with this option. etter-
              filter will print in a human readable form all the  instructions
              contained  in it. It is a sort of "disassembler" for binary fil-
              ter files.

       -d, --debug
              prints some debug messages during the compilation. Use  it  more
              than once to increase the debug level ( etterfilter -ddd ... ).

       -w, --suppress-warnings
              Don't  exit on warnings. With this option the compiler will com-
              pile the script even if it contains warnings.

       STANDARD OPTIONS

       -v, --version
              Print the version and exit.

       -h, --help
              prints the help screen with a short summary of the available op-
              tions.

       SCRIPTS SYNTAX
              A  script  is a compound of instructions. It is executed sequen-
              tially and you can make branches with the 'if' statements.  'if'
              and  'if/else'  statements  are the only supported. No loops are
              implemented. The syntax is almost like C code  except  that  you
              have  to put 'if' blocks into graph parentheses '{' '}', even if
              they contain only one instruction.

              NOTE: you have to put a space between the 'if' and the '('.  You
              must not put the space between the function name and the '('.

              Example:
              if (conditions) { }
              func(args...);

              The  conditions for an 'if' statement can be either functions or
              comparisons.  Two or more conditions can be linked together with
              logical operators like OR '||' and AND '&&'.

              Example:
              if (tcp.src == 21 && search(DATA.data, "ettercap")) {
              }

              Pay attention to the operator precedence.  You cannot use paren-
              theses to group conditions, so be careful with the order. An AND
              at  the  beginning  of  a  conditions block will exclude all the
              other tests if it is evaluated as false. The parsing is left-to-
              right, when an operator is found: if it is an AND and the previ-
              ous condition is false, all the statement is evaluated as false;
              if  it  is  an  OR  the parsing goes on even if the condition is
              false.

              Example:
              if (ip.proto == UDP || ip.proto == TCP && tcp.src == 80) {
              }

              if (ip.proto == TCP && tcp.src == 80 || ip.proto == UDP) {
              }

              the former condition will match all udp  or  http  traffic.  The
              latter  is  wrong,  because  if the packet is not tcp, the whole
              condition block will be evaluated as false.  If you want to make
              complex  conditions,  the  best way is to split them into nested
              'if' blocks.

              Since etterfilter support both IP address families,  you  should
              care  whether  you use 'ip.proto' which is specific for the IPv4
              address family or it's IPv6 couterpart 'ipv6.nh'. Especially for
              the  L4 protocol matching using 'ip.proto' and/or 'ipv6.nh', you
              should be careful if you're really acting on the right protocol.
              This  should  be  enforced  using  the  L3  protocol  identifier
              'eth.proto'.

              Example:
              if (eth.proto == IP && ip.proto ==  TCP  &&  tcp.dst  ==  80  ||
              tcp.src == 80) {
              }

              if  (eth.proto  ==  IP6  &&  ipv6.nh  == TCP && tcp.dst == 80 ||
              tcp.src == 80) {
              }

              if (tcp.dst == 80 || tcp.src == 80) {
              }

              The first example correctly matches http traffic  only  on  IPv4
              while  the  second  would  match  http traffic only on IPv6. The
              thrid example matches http regardless it's IP address familiy.

              Every instruction in a block must end with a semicolon ';'.

              Comparisons are implemented with the '==' operator  and  can  be
              used  to compare numbers, strings or ip addresses. An ip address
              MUST be enclosed within two single quotes (eg. '192.168.0.7'  or
              '2001:db8::2'). You can also use the 'less than' ('<'), 'greater
              than' ('>'), 'less or  equal'  ('<=')  and  'greater  or  equal'
              ('>=')  operators.  The lvalue of a comparison must be an offset
              (see later)

              Example:
              if (DATA.data + 20 == "ettercap" && ip.ttl > 16) {
              }

              Assignments are implemented with the '=' operator and the lvalue
              can be an offset (see later). The rvalue can be a string, an in-
              teger or a hexadecimal value.

              Example:
              ip.ttl = 0xff;
              DATA.data + 7 = "ettercap NG";

              You can also use the 'inc' and 'dec' operations  on  the  packet
              fields.  The operators used are '+=' and '-='. The rvalue can be
              an integer or a hexadecimal value.

              Example:
              ip.ttl += 5;

              More examples can be found in the etter.filter.examples file.

       OFFSET DEFINITION
              An offset is identified by a virtual pointer. In short words, an
              offset is a pointer to the packet buffer. The virtual pointer is
              a tuple <L, O, S>, where L is the iso/osi level, O is the offset
              in that level and S is the size of the virtual pointer.  You can
              make algebraic operations on a virtual pointer and the result is
              still  an  offset. Specifying 'vp + n' will result in a new vir-
              tual pointer <L, O+n, S>.  And this is perfectly legal, we  have
              changed the internal offset of that level.

              Virtual  pointers are in the form 'name.field.subfield'. For ex-
              ample 'ip.ttl' is the virtual pointer for the Time To Live field
              in  the  IP  header  of a packet. It will be translated as <L=3,
              O=9, S=1>. Indeed it is the 9th byte of level 3 and its size  is
              1  byte.  'ip.ttl  + 1' is the same as 'ip.proto' since the 10th
              byte of the IP header is the protocol  encapsulated  in  the  IP
              packet.  Note that since etterfilter also supports processing of
              IPv6, the above mentioned only applies for  IPv4  packets  while
              counterpart in IPv6 would be 'ipv6.nh'.

              The list of all supported virtual pointers is in the file etter-
              filter.tbl. You can add your own virtual pointers  by  adding  a
              new  table or modifying the existing ones. Refer to the comments
              at the beginning of the file for the syntax  of  etterfilter.tbl
              file.

       SCRIPTS FUNCTIONS

       search(where, what)
              this  function searches the string 'what' in the buffer 'where'.
              The buffer can be either DATA.data or DECODED.data.  The  former
              is  the payload at layer DATA (ontop TCP or UDP) as it is trans-
              mitted on the wire, the latter is the payload  decoded/decrypted
              by dissectors.
              So,  if you want to search in an SSH connection, it is better to
              use 'DECODED.data' since 'data' will be encrypted.
              The string 'what' can be binary. You have to escape it.

              example:
              search(DATA.data, "\x41\x42\x43")

       regex(where, regex)
              this function will return true if the 'regex'  has  matched  the
              buffer  'where'.   The  considerations  about 'DECODED.data' and
              'DATA.data' mentioned for the function 'search' are the same for
              the regex function.

              NOTE: regex can be used only against a string buffer.

              example:
              regex(DECODED.data, ".*login.*")

       pcre_regex(where, pcre_regex ... )
              this  function  will  evaluate a perl compatible regular expres-
              sion. You can match against both DATA and DECODED, but  if  your
              expression  modifies  the buffer, it makes sense to operate only
              on DATA. The function accepts 2 or 3 parameters depending on the
              operation you want. The two parameter form is used only to match
              a pattern. The three parameter form means that you want to  make
              a  substitution.  In  both  cases,  the  second parameter is the
              search string.
              You can use $n in the replacement string. These placeholders are
              referred  to  the  groups  created  in  the search string. (e.g.
              pcre_regex(DATA.data,    "^var1=([:digit:]*)&var2=([:digit:]*)",
              "var1=$2&var2=$1") will swap the value of var1 and var2).
              NOTE:  The  pcre support is optional in ettercap and will be en-
              abled only if you have the libpcre installed.  The compiler will
              warn  you  if you try to compile a filter that contains pcre ex-
              pressions but you don't have libpcre. Use the -w option to  sup-
              press the warning.

              example:
              pcre_regex(DATA.data, ".*foo$")
              pcre_regex(DATA.data, "([^ ]*) bar ([^ ]*)", "foo $1 $2")

       replace(what, with)
              this function replaces the string 'what' with the string 'with'.
              They can be binary string and must be escaped.  The  replacement
              is always performed in DATA.data since is the only payload which
              gets forwarded. The 'DECODED.data' buffer is  used  only  inter-
              nally and never reaches the wire.

              example:
              replace("ethercap", "ettercap")

       inject(what)
              this  function  injects the content of the file 'what' after the
              packet being processed. It always injects in DATA.data. You  can
              use  it  to  replace the entire packet with a fake one using the
              drop() function right before the inject() command.  In that case
              the filtering engine will drop the current packet and inject the
              fake one.

              example:
              inject("./fake_packet")

       log(what, where)
              this function dumps in the file 'where' the  buffer  'what'.  No
              information  is  stored  about  the  packet, only the payload is
              dumped. So you will see the stream in the file. If you  want  to
              log  packets in a more enhanced mode, you need to use the etter-
              cap -L option and analyze it with etterlog(8).
              The file 'where' must be writable to the user  EC_UID  (see  et-
              ter.conf(5)).

              example:
              log(DECODED.data, "/tmp/interesting.log")

       msg(message)
              this  function  displays  a message to the user in the User Mes-
              sages window. It is useful to let the user know whether  a  par-
              ticular filter has been successful or not.

              example:
              msg("Packet filtered successfully")

       drop() this  function marks the packet "to be dropped". The packet will
              not be forwarded to the real destination.

              example:
              drop()

       kill() this function kills the connection that owns the matched packet.
              If  it  is  a TCP connection, a RST is sent to both sides of the
              connection. If it is an UDP connection, an ICMP PORT UNREACHABLE
              is sent to the source of the packet.

              example:
              kill()

       exec(command)
              this  function executes a shell command. You have to provide the
              full path to the command since it is executed without any  envi-
              ronment.  There  is  no way to determine if the command was suc-
              cessful or not. Furthermore, it is executed asynchronously since
              it is forked by the main process.

              example:
              exec("/bin/cat /tmp/foo >> /tmp/bar")

       execinject(command)
              this  function  operates  similar  to the inject function except
              that it uses the output of a shell command to inject data rather
              than  the  contents  of a file.  It always injects in DATA.data.
              You can use it to replace the entire packet with a fake one  us-
              ing  the  drop() function right before the execinject() command.
              In that case the filtering engine will drop the  current  packet
              and inject the fake one.

              example:
              execinject("/bin/cat /tmp/foo")

       execreplace(command)
              this  function  operates  similar to the replace function except
              that it uses the output of a shell  command  to  replace  entire
              data  rather  than the contents of a file.  An other difference,
              is that orinal packet content is pass to the  shell  command  in
              stdin.   It  always  injects in DATA.data. You can use it to re-
              place the entire packet with a fake one depending on the  origi-
              nal one.

              example:
              execreplace("tr A-Z a-z")

       exit() this  function  causes  the  filter engine to stop executing the
              code. It is useful to stop the execution of the script  on  some
              circumstance checked by an 'if' statement.

              example:
              exit()

EXAMPLES
       Here are some examples of using etterfilter.

       etterfilter filter.ecf -o filter.ef

              Compiles the source filter.ecf into a binary filter.ef

ORIGINAL AUTHORS
       Alberto Ornaghi (ALoR) <>
       Marco Valleri (NaGA) <>

PROJECT STEWARDS
       Emilio Escobar (exfil)  <>
       Eric Milam (Brav0Hax)  <>

OFFICIAL DEVELOPERS
       Mike Ryan (justfalter)  <>
       Gianfranco Costamagna (LocutusOfBorg)  <>
       Antonio Collarino (sniper)  <>
       Ryan Linn   <>
       Jacob Baines   <>

CONTRIBUTORS
       Dhiru Kholia (kholia)  <>
       Alexander Koeppe (koeppea)  <>
       Martin Bos (PureHate)  <>
       Enrique Sanchez
       Gisle Vanem  <>
       Johannes Bauer  <>
       Daten (Bryan Schneiders)  <>

SEE ALSO
       etter.filter.examples
       ettercap(8) etterlog(8) etter.conf(5) ettercap_curses(8) ettercap_plug-
       ins(8) ettercap-pkexec(8)

ettercap 0.8.3.1                                                ETTERFILTER(8)

etterlog

Log analyzer for ettercap log files

:~# man etterlog
ETTERLOG(8)                 System Manager's Manual                ETTERLOG(8)

NAME
       etterlog - Log analyzer for ettercap log files

SYNOPSIS
       etterlog [OPTIONS] FILE

DESCRIPTION
       Etterlog  is  the log analyzer for logfiles created by ettercap. It can
       handle both compressed (created with  -Lc)  or  uncompressed  logfiles.
       With  this tool you can manipulate binary files as you like and you can
       print data in different ways all the times you want (in  contrast  with
       the  previous  logging system which was used to dump in a single static
       manner).
       You will be able to dump traffic  from  only  one  connection  of  your
       choice,  from  only one or more hosts, print data in hex, ascii, binary
       etc...

       TIP: All non-useful messages are printed to stderr, so you can save the
       output from etterlog with the following command:

       etterlog [options] logfile > outfile

              Thus  you can dump for example a binary file from an ftp connec-
              tion if you print the data in binary mode, without  headers  and
              selecting  only  the  ftp server as the source of the communica-
              tion.

       GENERAL OPTIONS

       -a, --analyze
              Analyze a log file and display some interesting statistics.

       -c, --connections
              Parse the log file and print a table of unique connections (port
              to  port).  This option can be used only on LOG_PACKET logfiles.
              On LOG_INFO logfiles it is useless.

              TIP: you can search for a particular host by using the following
              command:

              etterlog -c logfile.ecp | grep 10.0.0.1

       -f, --filter <TARGET>
              Print  only  packets  coming from or going to TARGET. The TARGET
              specification is the same as in ettercap.
              TARGET is in the form MAC/IPs/PORTs. With IPv6 support  enabled,
              TARGET  is  in the form MAC/IPs/IPv6/PORTs. Omitting one or more
              of its parts will be equivalent to set them to ANY. IPs and IPv6
              will be treated as one part so that it's only set to ANY if both
              IPs and IPv6 is omitted. This concludes in a result  most  users
              would expect.

              If  the log type is LOG_INFO the target is used to display hosts
              matching the mac, ip and having the specified port(s) open.  For
              example  the  target  //80  will  display only information about
              hosts with a running web server.

       -r, --reverse
              Reverse the matching in the TARGET selection. It means  not(TAR-
              GET). All but the selected TARGET.

       -t, --proto <PROTO>
              Sniff only PROTO packets (default is TCP + UDP).  This option is
              only useful in "simple" mode. If you start ettercap in  interac-
              tive mode both TCP and UDP are sniffed.
              PROTO can be "tcp", "udp" or "all" for both.

       -F, --filcon <CONNECTION>
              Print packets belonging only to this CONNECTION.
              CONNECTION is in the form PROTO:SOURCE:DEST. SOURCE and DEST are
              in the form IP:PORT.

              example:

              etterlog -F TCP:10.0.0.23:3318:198.182.196.56:80

       -s, --only-source
              Display only packets that are sent by the source of the selected
              CONNECTION.   This  option  makes sense only in conjunction with
              the -F option.

              TIP: if you want to save a file transferred in an  HTTP  or  FTP
              connection, you can use the following command:

              etterlog  -B -s -n -F TCP:10.0.0.1:20:10.0.0.2:35426 logfile.ecp
              > example.tar.gz

       -d, --only-dest
              Same as --only-source but it filters on the destination host.

       -n, --no-headers
              Do not print the header of each packet. This option is useful if
              you  want  to  save a file in binary format (-B option). Without
              the headers you can redirect the output to a file and  you  will
              get the original stream.

              NOTE:  the  time  stamp in the header is in the form: Thu Mar 27
              23:03:31 2003 [169396], the value in the square brackets is  ex-
              pressed in microseconds

       -m, --show-mac
              In  the headers show also the mac addresses corresponding to the
              ip addresses.

       -k, --color
              If used in conjunction with -F it displays the source  and  dest
              of  the  connection  using  different  colors.  If  used  with a
              LOG_INFO file it prints LAN hosts in green, REMOTE hosts in blue
              and GATEWAYS in red.

       -l, --only-local
              Used displaying an INFO file, it displays information only about
              local hosts.

       -L, --only-remote
              Used displaying an INFO file, it displays information only about
              remote hosts.

       SEARCH OPTIONS

       -e, --regex <REGEX>
              Display only packets matching the regex <REGEX>.
              If  this  option is used against a LOG_PACKET logfile, the regex
              is executed on the  payload  of  the  packet.  If  the  type  is
              LOG_INFO,  the  regex  is executed on all the fields of the host
              profile (OS, banners, service and ethernet adapter).
              NOTE: the regex is compiled with the REG_ICASE flag (case insen-
              sitive).

       -u, --user <USER>
              Display  information  about  this  user. The search is performed
              over all the user/pass couples collected across all hosts.

       -p, --passwords
              Print only the collected account information for each host. This
              prevents  the huge profile output. It can be used in conjunction
              with the -u option to filter the users. An asterisk '*' used  in
              front of an account represents a failed login attempt.

       -i, --show-client
              Show  the  client ip address when displaying the collected users
              and passwords. It may be useful when ACLs are in place.

       -I, --client <IP>
              Show passwords only coming from a specific <IP>. This is  useful
              to view all the usernames and passwords of a client.

       EDITING OPTIONS

       -C, --concat
              Use this option to concatenate two (or more) files into one sin-
              gle file. This is useful if  you  have  collected  ettercap  log
              files  from multiple sources and want to have an unified report.
              The output file must be specified with the -o option and the in-
              put files are listed as normal arguments.

              example:
              etterlog -C -o outfile input1 input2 input3

       -o, --outfile <FILE>
              specifies the output file for a concatenation.

       VISUALIZATION METHOD

       -B, --binary
              Print  data  as  they are, in binary form. Useful to dump binary
              data to a file (as described above).

       -X, --hex
              Print the packets in hex format.

              example:

              the string  "HTTP/1.1 304 Not Modified"  becomes:

              0000: 4854 5450 2f31 2e31 2033 3034 204e 6f74  HTTP/1.1 304 Not
              0010: 204d 6f64 6966 6965 64                    Modified

       -A, --ascii
              Print only "printable" characters, the others are  displayed  as
              dots '.'

       -T, --text
              Print only the "printable" characters and skip the others.

       -E, --ebcdic
              Convert an EBCDIC text to ASCII.

       -H, --html
              Strip all html tags from the text. A tag is every string between
              '<' and '>'.

              example:

              <title>This is the title</title>,  but  the  following  <string>
              will not be displayed.

              This is the title, but the following will not be displayed.

       -U, --utf8 <encoding>
              Print  the  packets  in  UTF-8  format. The <encoding> parameter
              specifies the encoding to be used while performing  the  conver-
              sion.  Use  the  `iconv  --list` command to obtain a list of all
              supported encodings.

       -Z, --zero
              Print always the void string. i.e. print only header information
              and no packet content will be printed.

       -x, --xml
              Print the host information in xml form, so you can parse it with
              your favourite program.

              The DTD associated with the xml output is in share/etterlog.dtd

       STANDARD OPTIONS

       -v, --version
              Print the version and exit.

       -h, --help
              Print the help screen with a short summary of the available  op-
              tions.

EXAMPLES
       Here are some examples of using etterlog.

       etterlog -k -l dump.eci

              Displays information about local hosts in different colors.

       etterlog -X dump.ecp

              Prints packets in HEX mode with full headers.

       etterlog -c dump.ecp

              Displays the list of connections logged in the file.

       etterlog -Akn -F TCP:10.0.0.1:13423:213.203.143.52:6666 dump.ecp

              Displays the IRC traffic made by 10.0.0.1 in ASCII mode, without
              headers information and in colored mode.

       etterlog -H -t tcp -f //80 dump.ecp

              Dumps all HTTP traffic and strips html tags.

       etterlog -Z -r -f /10.0.0.2/22 dump.ecp

              Displays only the headers of all connections except ssh on  host
              10.0.0.2

       etterlog -A -e 'user' -f //110 dump.ecp

              Displays only POP packets containing the 'user' regexp (case in-
              sensitive).

       etterlog -u root dump.eci

              Displays information about all the accounts of the user 'root'.

       etterlog -e Apache dump.eci

              Displays information about all the hosts running 'Apache'.

       etterlog -e Linux dump.eci

              Displays information about all the hosts with the 'Linux'  oper-
              ating system.

       etterlog -t tcp -f //110 dump.eci

              Displays  information  about all the hosts with the tcp port 110
              open.

       etterlog -t udp dump.eci

              Displays information about all the hosts with at least  one  UDP
              port open.

       etterlog -B -s -n -F TCP:10.0.0.1:20:10.0.0.2:35426 logfile.ecp > exam-
       ple.tar.gz

              Dumps in binary form the data sent by  10.0.0.1  over  the  data
              port  of  FTP.  Since  the headers are omitted, you will get the
              file as it was.

ORIGINAL AUTHORS
       Alberto Ornaghi (ALoR) <>
       Marco Valleri (NaGA) <>

PROJECT STEWARDS
       Emilio Escobar (exfil)  <>
       Eric Milam (Brav0Hax)  <>

OFFICIAL DEVELOPERS
       Mike Ryan (justfalter)  <>
       Gianfranco Costamagna (LocutusOfBorg)  <>
       Antonio Collarino (sniper)  <>
       Ryan Linn   <>
       Jacob Baines   <>

CONTRIBUTORS
       Dhiru Kholia (kholia)  <>
       Alexander Koeppe (koeppea)  <>
       Martin Bos (PureHate)  <>
       Enrique Sanchez
       Gisle Vanem  <>
       Johannes Bauer  <>
       Daten (Bryan Schneiders)  <>

SEE ALSO
       ettercap(8)  etterfilter(8)  etter.conf(5)  ettercap_curses(8)   etter-
       cap_plugins(8) ettercap-pkexec(8)

ettercap 0.8.3.1                                                   ETTERLOG(8)

ettercap-text-only

Ettercap supports active and passive dissection of many protocols (even encrypted ones) and includes many feature for network and host analysis.

Data injection in an established connection and filtering (substitute or drop a packet) on the fly is also possible, keeping the connection synchronized.

Many sniffing modes are implemented, for a powerful and complete sniffing suite. It is possible to sniff in four modes: IP Based, MAC Based, ARP Based (full-duplex) and PublicARP Based (half-duplex).

Ettercap also has the ability to detect a switched LAN, and to use OS fingerprints (active or passive) to find the geometry of the LAN.

This package contains the ettercap text-mode-only executable.

Installed size: 304 KB How to install: sudo apt install ettercap-text-only

Dependencies:
  • ettercap-common

  • libbsd0

  • libc6

  • libncurses6

  • libpcre2-8-0

  • libtinfo6

  • zlib1g

ettercap

Multipurpose sniffer/content filter for man in the middle attacks

:~# ettercap -h

ettercap 0.8.3.1 copyright 2001-2020 Ettercap Development Team


Usage: ettercap [OPTIONS] [TARGET1] [TARGET2]

TARGET is in the format MAC/IP/IPv6/PORTs (see the man for further detail)

Sniffing and Attack options:
  -M, --mitm <METHOD:ARGS>    perform a mitm attack
  -o, --only-mitm             don't sniff, only perform the mitm attack
  -b, --broadcast             sniff packets destined to broadcast
  -B, --bridge <IFACE>        use bridged sniff (needs 2 ifaces)
  -p, --nopromisc             do not put the iface in promisc mode
  -S, --nosslmitm             do not forge SSL certificates
  -u, --unoffensive           do not forward packets
  -r, --read <file>           read data from pcapfile <file>
  -f, --pcapfilter <string>   set the pcap filter <string>
  -R, --reversed              use reversed TARGET matching
  -t, --proto <proto>         sniff only this proto (default is all)
      --certificate <file>    certificate file to use for SSL MiTM
      --private-key <file>    private key file to use for SSL MiTM

User Interface Type:
  -T, --text                  use text only GUI
       -q, --quiet                 do not display packet contents
       -s, --script <CMD>          issue these commands to the GUI
  -C, --curses                use curses GUI
  -D, --daemon                daemonize ettercap (no GUI)
  -G, --gtk                   use GTK+ GUI

Logging options:
  -w, --write <file>          write sniffed data to pcapfile <file>
  -L, --log <logfile>         log all the traffic to this <logfile>
  -l, --log-info <logfile>    log only passive infos to this <logfile>
  -m, --log-msg <logfile>     log all the messages to this <logfile>
  -c, --compress              use gzip compression on log files

Visualization options:
  -d, --dns                   resolves ip addresses into hostnames
  -V, --visual <format>       set the visualization format
  -e, --regex <regex>         visualize only packets matching this regex
  -E, --ext-headers           print extended header for every pck
  -Q, --superquiet            do not display user and password

LUA options:
      --lua-script <script1>,[<script2>,...]     comma-separted list of LUA scripts
      --lua-args n1=v1,[n2=v2,...]               comma-separated arguments to LUA script(s)

General options:
  -i, --iface <iface>         use this network interface
  -I, --liface                show all the network interfaces
  -Y, --secondary <ifaces>    list of secondary network interfaces
  -n, --netmask <netmask>     force this <netmask> on iface
  -A, --address <address>     force this local <address> on iface
  -P, --plugin <plugin>       launch this <plugin> - multiple occurance allowed
      --plugin-list <plugin1>,[<plugin2>,...]       comma-separated list of plugins
  -F, --filter <file>         load the filter <file> (content filter)
  -z, --silent                do not perform the initial ARP scan
  -6, --ip6scan               send ICMPv6 probes to discover IPv6 nodes on the link
  -j, --load-hosts <file>     load the hosts list from <file>
  -k, --save-hosts <file>     save the hosts list to <file>
  -W, --wifi-key <wkey>       use this key to decrypt wifi packets (wep or wpa)
  -a, --config <config>       use the alternative config file <config>

Standard options:
  -v, --version               prints the version and exit
  -h, --help                  this help screen


etterfilter

Filter compiler for ettercap content filtering engine

:~# man etterfilter
ETTERFILTER(8)              System Manager's Manual             ETTERFILTER(8)

NAME
       etterfilter - Filter compiler for ettercap content filtering engine

SYNOPSIS
       etterfilter [OPTIONS] FILE

DESCRIPTION
       The etterfilter utility is used to compile source filter files into bi-
       nary filter files that can be interpreted by the JIT interpreter in the
       ettercap(8)  filter  engine. You have to compile your filter scripts in
       order to use them in ettercap. All syntax/parse errors will be  checked
       at compile time, so you will be sure to produce a correct binary filter
       for ettercap.

       GENERAL OPTIONS

       -o, --output <FILE>
              you can specify the output file for a source filter file. By de-
              fault the output is filter.ef.

       -t, --test <FILE>
              you  can analyze a compiled filter file with this option. etter-
              filter will print in a human readable form all the  instructions
              contained  in it. It is a sort of "disassembler" for binary fil-
              ter files.

       -d, --debug
              prints some debug messages during the compilation. Use  it  more
              than once to increase the debug level ( etterfilter -ddd ... ).

       -w, --suppress-warnings
              Don't  exit on warnings. With this option the compiler will com-
              pile the script even if it contains warnings.

       STANDARD OPTIONS

       -v, --version
              Print the version and exit.

       -h, --help
              prints the help screen with a short summary of the available op-
              tions.

       SCRIPTS SYNTAX
              A  script  is a compound of instructions. It is executed sequen-
              tially and you can make branches with the 'if' statements.  'if'
              and  'if/else'  statements  are the only supported. No loops are
              implemented. The syntax is almost like C code  except  that  you
              have  to put 'if' blocks into graph parentheses '{' '}', even if
              they contain only one instruction.

              NOTE: you have to put a space between the 'if' and the '('.  You
              must not put the space between the function name and the '('.

              Example:
              if (conditions) { }
              func(args...);

              The  conditions for an 'if' statement can be either functions or
              comparisons.  Two or more conditions can be linked together with
              logical operators like OR '||' and AND '&&'.

              Example:
              if (tcp.src == 21 && search(DATA.data, "ettercap")) {
              }

              Pay attention to the operator precedence.  You cannot use paren-
              theses to group conditions, so be careful with the order. An AND
              at  the  beginning  of  a  conditions block will exclude all the
              other tests if it is evaluated as false. The parsing is left-to-
              right, when an operator is found: if it is an AND and the previ-
              ous condition is false, all the statement is evaluated as false;
              if  it  is  an  OR  the parsing goes on even if the condition is
              false.

              Example:
              if (ip.proto == UDP || ip.proto == TCP && tcp.src == 80) {
              }

              if (ip.proto == TCP && tcp.src == 80 || ip.proto == UDP) {
              }

              the former condition will match all udp  or  http  traffic.  The
              latter  is  wrong,  because  if the packet is not tcp, the whole
              condition block will be evaluated as false.  If you want to make
              complex  conditions,  the  best way is to split them into nested
              'if' blocks.

              Since etterfilter support both IP address families,  you  should
              care  whether  you use 'ip.proto' which is specific for the IPv4
              address family or it's IPv6 couterpart 'ipv6.nh'. Especially for
              the  L4 protocol matching using 'ip.proto' and/or 'ipv6.nh', you
              should be careful if you're really acting on the right protocol.
              This  should  be  enforced  using  the  L3  protocol  identifier
              'eth.proto'.

              Example:
              if (eth.proto == IP && ip.proto ==  TCP  &&  tcp.dst  ==  80  ||
              tcp.src == 80) {
              }

              if  (eth.proto  ==  IP6  &&  ipv6.nh  == TCP && tcp.dst == 80 ||
              tcp.src == 80) {
              }

              if (tcp.dst == 80 || tcp.src == 80) {
              }

              The first example correctly matches http traffic  only  on  IPv4
              while  the  second  would  match  http traffic only on IPv6. The
              thrid example matches http regardless it's IP address familiy.

              Every instruction in a block must end with a semicolon ';'.

              Comparisons are implemented with the '==' operator  and  can  be
              used  to compare numbers, strings or ip addresses. An ip address
              MUST be enclosed within two single quotes (eg. '192.168.0.7'  or
              '2001:db8::2'). You can also use the 'less than' ('<'), 'greater
              than' ('>'), 'less or  equal'  ('<=')  and  'greater  or  equal'
              ('>=')  operators.  The lvalue of a comparison must be an offset
              (see later)

              Example:
              if (DATA.data + 20 == "ettercap" && ip.ttl > 16) {
              }

              Assignments are implemented with the '=' operator and the lvalue
              can be an offset (see later). The rvalue can be a string, an in-
              teger or a hexadecimal value.

              Example:
              ip.ttl = 0xff;
              DATA.data + 7 = "ettercap NG";

              You can also use the 'inc' and 'dec' operations  on  the  packet
              fields.  The operators used are '+=' and '-='. The rvalue can be
              an integer or a hexadecimal value.

              Example:
              ip.ttl += 5;

              More examples can be found in the etter.filter.examples file.

       OFFSET DEFINITION
              An offset is identified by a virtual pointer. In short words, an
              offset is a pointer to the packet buffer. The virtual pointer is
              a tuple <L, O, S>, where L is the iso/osi level, O is the offset
              in that level and S is the size of the virtual pointer.  You can
              make algebraic operations on a virtual pointer and the result is
              still  an  offset. Specifying 'vp + n' will result in a new vir-
              tual pointer <L, O+n, S>.  And this is perfectly legal, we  have
              changed the internal offset of that level.

              Virtual  pointers are in the form 'name.field.subfield'. For ex-
              ample 'ip.ttl' is the virtual pointer for the Time To Live field
              in  the  IP  header  of a packet. It will be translated as <L=3,
              O=9, S=1>. Indeed it is the 9th byte of level 3 and its size  is
              1  byte.  'ip.ttl  + 1' is the same as 'ip.proto' since the 10th
              byte of the IP header is the protocol  encapsulated  in  the  IP
              packet.  Note that since etterfilter also supports processing of
              IPv6, the above mentioned only applies for  IPv4  packets  while
              counterpart in IPv6 would be 'ipv6.nh'.

              The list of all supported virtual pointers is in the file etter-
              filter.tbl. You can add your own virtual pointers  by  adding  a
              new  table or modifying the existing ones. Refer to the comments
              at the beginning of the file for the syntax  of  etterfilter.tbl
              file.

       SCRIPTS FUNCTIONS

       search(where, what)
              this  function searches the string 'what' in the buffer 'where'.
              The buffer can be either DATA.data or DECODED.data.  The  former
              is  the payload at layer DATA (ontop TCP or UDP) as it is trans-
              mitted on the wire, the latter is the payload  decoded/decrypted
              by dissectors.
              So,  if you want to search in an SSH connection, it is better to
              use 'DECODED.data' since 'data' will be encrypted.
              The string 'what' can be binary. You have to escape it.

              example:
              search(DATA.data, "\x41\x42\x43")

       regex(where, regex)
              this function will return true if the 'regex'  has  matched  the
              buffer  'where'.   The  considerations  about 'DECODED.data' and
              'DATA.data' mentioned for the function 'search' are the same for
              the regex function.

              NOTE: regex can be used only against a string buffer.

              example:
              regex(DECODED.data, ".*login.*")

       pcre_regex(where, pcre_regex ... )
              this  function  will  evaluate a perl compatible regular expres-
              sion. You can match against both DATA and DECODED, but  if  your
              expression  modifies  the buffer, it makes sense to operate only
              on DATA. The function accepts 2 or 3 parameters depending on the
              operation you want. The two parameter form is used only to match
              a pattern. The three parameter form means that you want to  make
              a  substitution.  In  both  cases,  the  second parameter is the
              search string.
              You can use $n in the replacement string. These placeholders are
              referred  to  the  groups  created  in  the search string. (e.g.
              pcre_regex(DATA.data,    "^var1=([:digit:]*)&var2=([:digit:]*)",
              "var1=$2&var2=$1") will swap the value of var1 and var2).
              NOTE:  The  pcre support is optional in ettercap and will be en-
              abled only if you have the libpcre installed.  The compiler will
              warn  you  if you try to compile a filter that contains pcre ex-
              pressions but you don't have libpcre. Use the -w option to  sup-
              press the warning.

              example:
              pcre_regex(DATA.data, ".*foo$")
              pcre_regex(DATA.data, "([^ ]*) bar ([^ ]*)", "foo $1 $2")

       replace(what, with)
              this function replaces the string 'what' with the string 'with'.
              They can be binary string and must be escaped.  The  replacement
              is always performed in DATA.data since is the only payload which
              gets forwarded. The 'DECODED.data' buffer is  used  only  inter-
              nally and never reaches the wire.

              example:
              replace("ethercap", "ettercap")

       inject(what)
              this  function  injects the content of the file 'what' after the
              packet being processed. It always injects in DATA.data. You  can
              use  it  to  replace the entire packet with a fake one using the
              drop() function right before the inject() command.  In that case
              the filtering engine will drop the current packet and inject the
              fake one.

              example:
              inject("./fake_packet")

       log(what, where)
              this function dumps in the file 'where' the  buffer  'what'.  No
              information  is  stored  about  the  packet, only the payload is
              dumped. So you will see the stream in the file. If you  want  to
              log  packets in a more enhanced mode, you need to use the etter-
              cap -L option and analyze it with etterlog(8).
              The file 'where' must be writable to the user  EC_UID  (see  et-
              ter.conf(5)).

              example:
              log(DECODED.data, "/tmp/interesting.log")

       msg(message)
              this  function  displays  a message to the user in the User Mes-
              sages window. It is useful to let the user know whether  a  par-
              ticular filter has been successful or not.

              example:
              msg("Packet filtered successfully")

       drop() this  function marks the packet "to be dropped". The packet will
              not be forwarded to the real destination.

              example:
              drop()

       kill() this function kills the connection that owns the matched packet.
              If  it  is  a TCP connection, a RST is sent to both sides of the
              connection. If it is an UDP connection, an ICMP PORT UNREACHABLE
              is sent to the source of the packet.

              example:
              kill()

       exec(command)
              this  function executes a shell command. You have to provide the
              full path to the command since it is executed without any  envi-
              ronment.  There  is  no way to determine if the command was suc-
              cessful or not. Furthermore, it is executed asynchronously since
              it is forked by the main process.

              example:
              exec("/bin/cat /tmp/foo >> /tmp/bar")

       execinject(command)
              this  function  operates  similar  to the inject function except
              that it uses the output of a shell command to inject data rather
              than  the  contents  of a file.  It always injects in DATA.data.
              You can use it to replace the entire packet with a fake one  us-
              ing  the  drop() function right before the execinject() command.
              In that case the filtering engine will drop the  current  packet
              and inject the fake one.

              example:
              execinject("/bin/cat /tmp/foo")

       execreplace(command)
              this  function  operates  similar to the replace function except
              that it uses the output of a shell  command  to  replace  entire
              data  rather  than the contents of a file.  An other difference,
              is that orinal packet content is pass to the  shell  command  in
              stdin.   It  always  injects in DATA.data. You can use it to re-
              place the entire packet with a fake one depending on the  origi-
              nal one.

              example:
              execreplace("tr A-Z a-z")

       exit() this  function  causes  the  filter engine to stop executing the
              code. It is useful to stop the execution of the script  on  some
              circumstance checked by an 'if' statement.

              example:
              exit()

EXAMPLES
       Here are some examples of using etterfilter.

       etterfilter filter.ecf -o filter.ef

              Compiles the source filter.ecf into a binary filter.ef

ORIGINAL AUTHORS
       Alberto Ornaghi (ALoR) <>
       Marco Valleri (NaGA) <>

PROJECT STEWARDS
       Emilio Escobar (exfil)  <>
       Eric Milam (Brav0Hax)  <>

OFFICIAL DEVELOPERS
       Mike Ryan (justfalter)  <>
       Gianfranco Costamagna (LocutusOfBorg)  <>
       Antonio Collarino (sniper)  <>
       Ryan Linn   <>
       Jacob Baines   <>

CONTRIBUTORS
       Dhiru Kholia (kholia)  <>
       Alexander Koeppe (koeppea)  <>
       Martin Bos (PureHate)  <>
       Enrique Sanchez
       Gisle Vanem  <>
       Johannes Bauer  <>
       Daten (Bryan Schneiders)  <>

SEE ALSO
       etter.filter.examples
       ettercap(8) etterlog(8) etter.conf(5) ettercap_curses(8) ettercap_plug-
       ins(8) ettercap-pkexec(8)

ettercap 0.8.3.1                                                ETTERFILTER(8)

etterlog

Log analyzer for ettercap log files

:~# man etterlog
ETTERLOG(8)                 System Manager's Manual                ETTERLOG(8)

NAME
       etterlog - Log analyzer for ettercap log files

SYNOPSIS
       etterlog [OPTIONS] FILE

DESCRIPTION
       Etterlog  is  the log analyzer for logfiles created by ettercap. It can
       handle both compressed (created with  -Lc)  or  uncompressed  logfiles.
       With  this tool you can manipulate binary files as you like and you can
       print data in different ways all the times you want (in  contrast  with
       the  previous  logging system which was used to dump in a single static
       manner).
       You will be able to dump traffic  from  only  one  connection  of  your
       choice,  from  only one or more hosts, print data in hex, ascii, binary
       etc...

       TIP: All non-useful messages are printed to stderr, so you can save the
       output from etterlog with the following command:

       etterlog [options] logfile > outfile

              Thus  you can dump for example a binary file from an ftp connec-
              tion if you print the data in binary mode, without  headers  and
              selecting  only  the  ftp server as the source of the communica-
              tion.

       GENERAL OPTIONS

       -a, --analyze
              Analyze a log file and display some interesting statistics.

       -c, --connections
              Parse the log file and print a table of unique connections (port
              to  port).  This option can be used only on LOG_PACKET logfiles.
              On LOG_INFO logfiles it is useless.

              TIP: you can search for a particular host by using the following
              command:

              etterlog -c logfile.ecp | grep 10.0.0.1

       -f, --filter <TARGET>
              Print  only  packets  coming from or going to TARGET. The TARGET
              specification is the same as in ettercap.
              TARGET is in the form MAC/IPs/PORTs. With IPv6 support  enabled,
              TARGET  is  in the form MAC/IPs/IPv6/PORTs. Omitting one or more
              of its parts will be equivalent to set them to ANY. IPs and IPv6
              will be treated as one part so that it's only set to ANY if both
              IPs and IPv6 is omitted. This concludes in a result  most  users
              would expect.

              If  the log type is LOG_INFO the target is used to display hosts
              matching the mac, ip and having the specified port(s) open.  For
              example  the  target  //80  will  display only information about
              hosts with a running web server.

       -r, --reverse
              Reverse the matching in the TARGET selection. It means  not(TAR-
              GET). All but the selected TARGET.

       -t, --proto <PROTO>
              Sniff only PROTO packets (default is TCP + UDP).  This option is
              only useful in "simple" mode. If you start ettercap in  interac-
              tive mode both TCP and UDP are sniffed.
              PROTO can be "tcp", "udp" or "all" for both.

       -F, --filcon <CONNECTION>
              Print packets belonging only to this CONNECTION.
              CONNECTION is in the form PROTO:SOURCE:DEST. SOURCE and DEST are
              in the form IP:PORT.

              example:

              etterlog -F TCP:10.0.0.23:3318:198.182.196.56:80

       -s, --only-source
              Display only packets that are sent by the source of the selected
              CONNECTION.   This  option  makes sense only in conjunction with
              the -F option.

              TIP: if you want to save a file transferred in an  HTTP  or  FTP
              connection, you can use the following command:

              etterlog  -B -s -n -F TCP:10.0.0.1:20:10.0.0.2:35426 logfile.ecp
              > example.tar.gz

       -d, --only-dest
              Same as --only-source but it filters on the destination host.

       -n, --no-headers
              Do not print the header of each packet. This option is useful if
              you  want  to  save a file in binary format (-B option). Without
              the headers you can redirect the output to a file and  you  will
              get the original stream.

              NOTE:  the  time  stamp in the header is in the form: Thu Mar 27
              23:03:31 2003 [169396], the value in the square brackets is  ex-
              pressed in microseconds

       -m, --show-mac
              In  the headers show also the mac addresses corresponding to the
              ip addresses.

       -k, --color
              If used in conjunction with -F it displays the source  and  dest
              of  the  connection  using  different  colors.  If  used  with a
              LOG_INFO file it prints LAN hosts in green, REMOTE hosts in blue
              and GATEWAYS in red.

       -l, --only-local
              Used displaying an INFO file, it displays information only about
              local hosts.

       -L, --only-remote
              Used displaying an INFO file, it displays information only about
              remote hosts.

       SEARCH OPTIONS

       -e, --regex <REGEX>
              Display only packets matching the regex <REGEX>.
              If  this  option is used against a LOG_PACKET logfile, the regex
              is executed on the  payload  of  the  packet.  If  the  type  is
              LOG_INFO,  the  regex  is executed on all the fields of the host
              profile (OS, banners, service and ethernet adapter).
              NOTE: the regex is compiled with the REG_ICASE flag (case insen-
              sitive).

       -u, --user <USER>
              Display  information  about  this  user. The search is performed
              over all the user/pass couples collected across all hosts.

       -p, --passwords
              Print only the collected account information for each host. This
              prevents  the huge profile output. It can be used in conjunction
              with the -u option to filter the users. An asterisk '*' used  in
              front of an account represents a failed login attempt.

       -i, --show-client
              Show  the  client ip address when displaying the collected users
              and passwords. It may be useful when ACLs are in place.

       -I, --client <IP>
              Show passwords only coming from a specific <IP>. This is  useful
              to view all the usernames and passwords of a client.

       EDITING OPTIONS

       -C, --concat
              Use this option to concatenate two (or more) files into one sin-
              gle file. This is useful if  you  have  collected  ettercap  log
              files  from multiple sources and want to have an unified report.
              The output file must be specified with the -o option and the in-
              put files are listed as normal arguments.

              example:
              etterlog -C -o outfile input1 input2 input3

       -o, --outfile <FILE>
              specifies the output file for a concatenation.

       VISUALIZATION METHOD

       -B, --binary
              Print  data  as  they are, in binary form. Useful to dump binary
              data to a file (as described above).

       -X, --hex
              Print the packets in hex format.

              example:

              the string  "HTTP/1.1 304 Not Modified"  becomes:

              0000: 4854 5450 2f31 2e31 2033 3034 204e 6f74  HTTP/1.1 304 Not
              0010: 204d 6f64 6966 6965 64                    Modified

       -A, --ascii
              Print only "printable" characters, the others are  displayed  as
              dots '.'

       -T, --text
              Print only the "printable" characters and skip the others.

       -E, --ebcdic
              Convert an EBCDIC text to ASCII.

       -H, --html
              Strip all html tags from the text. A tag is every string between
              '<' and '>'.

              example:

              <title>This is the title</title>,  but  the  following  <string>
              will not be displayed.

              This is the title, but the following will not be displayed.

       -U, --utf8 <encoding>
              Print  the  packets  in  UTF-8  format. The <encoding> parameter
              specifies the encoding to be used while performing  the  conver-
              sion.  Use  the  `iconv  --list` command to obtain a list of all
              supported encodings.

       -Z, --zero
              Print always the void string. i.e. print only header information
              and no packet content will be printed.

       -x, --xml
              Print the host information in xml form, so you can parse it with
              your favourite program.

              The DTD associated with the xml output is in share/etterlog.dtd

       STANDARD OPTIONS

       -v, --version
              Print the version and exit.

       -h, --help
              Print the help screen with a short summary of the available  op-
              tions.

EXAMPLES
       Here are some examples of using etterlog.

       etterlog -k -l dump.eci

              Displays information about local hosts in different colors.

       etterlog -X dump.ecp

              Prints packets in HEX mode with full headers.

       etterlog -c dump.ecp

              Displays the list of connections logged in the file.

       etterlog -Akn -F TCP:10.0.0.1:13423:213.203.143.52:6666 dump.ecp

              Displays the IRC traffic made by 10.0.0.1 in ASCII mode, without
              headers information and in colored mode.

       etterlog -H -t tcp -f //80 dump.ecp

              Dumps all HTTP traffic and strips html tags.

       etterlog -Z -r -f /10.0.0.2/22 dump.ecp

              Displays only the headers of all connections except ssh on  host
              10.0.0.2

       etterlog -A -e 'user' -f //110 dump.ecp

              Displays only POP packets containing the 'user' regexp (case in-
              sensitive).

       etterlog -u root dump.eci

              Displays information about all the accounts of the user 'root'.

       etterlog -e Apache dump.eci

              Displays information about all the hosts running 'Apache'.

       etterlog -e Linux dump.eci

              Displays information about all the hosts with the 'Linux'  oper-
              ating system.

       etterlog -t tcp -f //110 dump.eci

              Displays  information  about all the hosts with the tcp port 110
              open.

       etterlog -t udp dump.eci

              Displays information about all the hosts with at least  one  UDP
              port open.

       etterlog -B -s -n -F TCP:10.0.0.1:20:10.0.0.2:35426 logfile.ecp > exam-
       ple.tar.gz

              Dumps in binary form the data sent by  10.0.0.1  over  the  data
              port  of  FTP.  Since  the headers are omitted, you will get the
              file as it was.

ORIGINAL AUTHORS
       Alberto Ornaghi (ALoR) <>
       Marco Valleri (NaGA) <>

PROJECT STEWARDS
       Emilio Escobar (exfil)  <>
       Eric Milam (Brav0Hax)  <>

OFFICIAL DEVELOPERS
       Mike Ryan (justfalter)  <>
       Gianfranco Costamagna (LocutusOfBorg)  <>
       Antonio Collarino (sniper)  <>
       Ryan Linn   <>
       Jacob Baines   <>

CONTRIBUTORS
       Dhiru Kholia (kholia)  <>
       Alexander Koeppe (koeppea)  <>
       Martin Bos (PureHate)  <>
       Enrique Sanchez
       Gisle Vanem  <>
       Johannes Bauer  <>
       Daten (Bryan Schneiders)  <>

SEE ALSO
       ettercap(8)  etterfilter(8)  etter.conf(5)  ettercap_curses(8)   etter-
       cap_plugins(8) ettercap-pkexec(8)

ettercap 0.8.3.1                                                   ETTERLOG(8)

Updated on: 2023-Mar-08


Last updated