Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/superkojiman/snuff
Automate ARP poisoning, ssltrip, and ettercap.
https://github.com/superkojiman/snuff
Last synced: 21 days ago
JSON representation
Automate ARP poisoning, ssltrip, and ettercap.
- Host: GitHub
- URL: https://github.com/superkojiman/snuff
- Owner: superkojiman
- License: mit
- Created: 2014-09-05T21:38:16.000Z (over 10 years ago)
- Default Branch: master
- Last Pushed: 2017-01-01T05:41:34.000Z (almost 8 years ago)
- Last Synced: 2024-10-30T15:28:15.115Z (about 1 month ago)
- Language: Shell
- Homepage:
- Size: 1.95 KB
- Stars: 43
- Watchers: 4
- Forks: 19
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE.md
Awesome Lists containing this project
- awesome-hacking-lists - superkojiman/snuff - Automate ARP poisoning, ssltrip, and ettercap. (Shell)
README
snuff
=====Man-in-the-middle (MITM) attacks are an effective way to capture data flowing between a target and the router. In a nutshell, the attacker places himself between the target and the router so that all data flows through the attacker’s machine. The target thinks he’s communicating with the router, and the router thinks it’s communicating with the target, when in reality, they are communicating with the attacker and the attacker just relays the information back and forth. It’s like a malicious mailman who reads your letters before sealing them and sending them off.
Using a combination of tools readily available online such as arpspoof, ettercap, and sslsniff, we can capture a user’s login credentials and trick them into thinking that they are logging in through an encrypted connection.
For more details, see [http://blog.techorganic.com/2011/07/13/sniffing-website-login-credentials/](http://blog.techorganic.com/2011/07/13/sniffing-website-login-credentials/)