Bored. Today, I took the n900 to the community and turned around. Try ettercap on the new integer.
Conducts arp spoofing sniffing. Find a Google email account and password. The password of a QQ space.
Very strong. HTTPS can be intercepted. Compared with CAIN. At that time, no images were loaded. It cannot be sent.
I use my blog www.tmdsb.com for testing. Install the ettercap software first.
It will not be installed by yourself. Go to the source to install it. After installation. Run ettercap-help
Is all running parameters. A lot of commands. The command is case-sensitive. NND. LINUX
Command.
Run the following command to perform sniffing:
Ettercap-T-M arp-I wlan0 ///-w tmdsb. cap (// It means sniffing all.
If multiple IP addresses exist in the same network. You can also specify an IP address. For example,/192.168.1.100 // 192.168.1.1/is followed by the IP address of the route)
Tmdsb. cap stores the sniffed data. After running:
Figure 2
Figure 3
Figure 4
Then open my blog. Enter the account password. Log on to your blog.
Run cat tmdsb. cap | grep tmdsb to find the data of tmdsb.
The red circle shows my blog account and password. Of course, this is not a real password.
From: semi-pitfall farmer's blog