Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/mrecco/docker-ettercap
https://github.com/mrecco/docker-ettercap
Last synced: 23 days ago
JSON representation
- Host: GitHub
- URL: https://github.com/mrecco/docker-ettercap
- Owner: MrEcco
- Created: 2019-04-15T11:03:05.000Z (over 5 years ago)
- Default Branch: master
- Last Pushed: 2019-11-14T19:23:37.000Z (about 5 years ago)
- Last Synced: 2024-10-12T01:11:24.141Z (about 1 month ago)
- Language: Dockerfile
- Size: 3.91 KB
- Stars: 0
- Watchers: 2
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# Ettercap
Special build for in-docker use for [ettercap](https://github.com/Ettercap/ettercap) project. Arp-spoofing module ideal work for present configuration!
Dont be shy to contribute it or me! :)
## Usage
### Docker
```bash
docker run --rm -it \
--cap-add SYS_ADMIN \
--cap-add NET_ADMIN \
--network host \
mrecco/ettercap \
-TbqM arp \
-oi interface_name
```### Docker-compose
```docker-compose
version: '3.0'
services:
ettercap:
container_name: hack-ettercap
image: mrecco/ettercap:latest
command:
- "-TbqM"
- "arp"
- "-oi"
- "interface_name"
network_mode: host
pid: host
# privileged: true
cap_add:
- NET_ADMIN
- SYS_ADMIN
stop_grace_period: 3s
```
## PreconfigureYou need to prepare host mashine for this trick. Use it smart!!!
```bash
# Say kernel "lets forward packets!"
echo 1 > /proc/sys/net/ipv4/ip_forward
# Say firewall "lets nat forward connections"
iptables -t nat -I POSTROUTING -s 192.168.1.0/24 -j MASQUERADE
```## Documentation
[https://linux.die.net/man/8/ettercap](https://linux.die.net/man/8/ettercap) [EN]
[https://pentestmag.com/ettercap-tutorial-for-windows/](https://pentestmag.com/ettercap-tutorial-for-windows/) [EN]
[https://kali.tools/?p=830](https://kali.tools/?p=830) [RU]