ettercap sniffing 1

ettercap sniffing

sudo ettercap -T -M arp:remote /192.168.0.1//192.168.0.2/

Here is what the above code is Doing:
1. We’re using the -T flag to tell ettercap that we want to use the text-based interface.
2. We’re using the -M flag to tell ettercap that we want to use the arp poisoning method.
3. We’re using the arp:remote flag to tell ettercap that we want to use the remote arp poisoning method.
4. We’re using the /192.168.0.1//192.168.0.2/ flag to tell ettercap that we want to poison the ARP cache of the victim with the IP address of 192.168.0.1 and the gateway with the IP address of 192.168.0.2.

Similar Posts