- This topic has 9 replies, 2 voices, and was last updated 4 years, 5 months ago by Diego Pérez.
- AuthorPosts
- June 27, 2020 at 3:34 pm #40856Ujjwal Reddy K SParticipant
if I enter ettercap -Tq ///
sir I am getting errorettercap 0.8.3 copyright 2001-2019 Ettercap Development Team
Listening on:
wlan0 -> 00:C0:CA:98:96:E8
192.168.43.175/255.255.255.0
fe80::3f3:eced:1625:593e/64set_redir_commands(): cannot setup the redirect for IPv6, did you uncomment the redir6_command_on command on your etter.conf file?
Ooops ! This shouldn’t happen…
Segmentation Fault…Please recompile in debug mode, reproduce the bug and send a bugreport
Have a nice day!
how to fix sir, I had all steps u did
June 28, 2020 at 4:10 am #40892Diego PérezModeratorHi!
As mentioned by the error, did you uncomment the redir6_command_on command on your etter.conf file?Let me know.
DiegoJune 28, 2020 at 4:21 am #40893Ujjwal Reddy K SParticipantyes I did so this error I got sir
June 29, 2020 at 6:11 am #40962Diego PérezModeratorHi!
Can you share the content of etter.conf?
Let me know.
DiegoJune 29, 2020 at 6:20 am #40965Ujjwal Reddy K SParticipant############################################################################
# #
# ettercap — etter.conf — configuration file #
# #
# Copyright (C) ALoR & NaGA #
# #
# This program is free software; you can redistribute it and/or modify #
# it under the terms of the GNU General Public License as published by #
# the Free Software Foundation; either version 2 of the License, or #
# (at your option) any later version. #
# #
# #
############################################################################[privs]
ec_uid = 0 # nobody is the default
ec_gid = 0 # nobody is the default[mitm]
arp_storm_delay = 10 # milliseconds
arp_poison_smart = 0 # boolean
arp_poison_warm_up = 1 # seconds
arp_poison_delay = 10 # seconds
arp_poison_icmp = 1 # boolean
arp_poison_reply = 1 # boolean
arp_poison_request = 0 # boolean
arp_poison_equal_mac = 1 # boolean
dhcp_lease_time = 1800 # seconds
port_steal_delay = 10 # seconds
port_steal_send_delay = 2000 # microseconds
ndp_poison_warm_up = 1 # seconds
ndp_poison_delay = 5 # seconds
ndp_poison_send_delay = 1500 # microseconds
ndp_poison_icmp = 1 # boolean
ndp_poison_equal_mac = 1 # boolean
icmp6_probe_delay = 3 # seconds[connections]
connection_timeout = 300 # seconds
connection_idle = 5 # seconds
connection_buffer = 10000 # bytes
connect_timeout = 5 # seconds[stats]
sampling_rate = 50 # number of packets[misc]
close_on_eof = 1 # boolean value
store_profiles = 1 # 0 = disabled; 1 = all; 2 = local; 3 = remote
aggressive_dissectors = 1 # boolean value
skip_forwarded_pcks = 1 # boolean value
checksum_check = 0 # boolean value
submit_fingerprint = 0 # boolean valid (set if you want ettercap to submit unknown finger prints)
checksum_warning = 0 # boolean value (valid only if checksum_check is 1)
sniffing_at_startup = 1 # boolean value
geoip_support_enable = 1 # boolean value (set geoip_data_file of GeoIP database file cannot be located)
gtkui_prefer_dark_theme = 0 # boolean value############################################################################
#
# You can specify what DISSECTORS are to be enabled or not…
#
# e.g.: ftp = 21 enabled on port 21 (tcp is implicit)
# ftp = 2345 enabled on non standard port
# ftp = 21,453 enabled on port 21 and 453
# ftp = 0 disabled
#
# NOTE: some dissectors have multiple default ports, if you specify a new
# one, all the default ports will be overwritten
#
##dissector default port
[dissectors]
ftp = 21 # tcp 21
ssh = 22 # tcp 22
telnet = 23 # tcp 23
smtp = 25 # tcp 25
dns = 53 # udp 53
dhcp = 67 # udp 68
http = 80 # tcp 80
ospf = 89 # ip 89 (IPPROTO 0x59)
pop3 = 110 # tcp 110
#portmap = 111 # tcp / udp
vrrp = 112 # ip 112 (IPPROTO 0x70)
nntp = 119 # tcp 119
smb = 139,445 # tcp 139 445
imap = 143,220 # tcp 143 220
snmp = 161 # udp 161
bgp = 179 # tcp 179
ldap = 389 # tcp 389
https = 443 # tcp 443
ssmtp = 465 # tcp 465
rlogin = 512,513 # tcp 512 513
rip = 520 # udp 520
nntps = 563 # tcp 563
ldaps = 636 # tcp 636
telnets = 992 # tcp 992
imaps = 993 # tcp 993
ircs = 994 # tcp 993
pop3s = 995 # tcp 995
socks = 1080 # tcp 1080
radius = 1645,1646 # udp 1645 1646
msn = 1863 # tcp 1863
cvs = 2401 # tcp 2401
mysql = 3306 # tcp 3306
icq = 5190 # tcp 5190
ymsg = 5050 # tcp 5050
mdns = 5353 # udp 5353
vnc = 5900,5901,5902,5903 # tcp 5900 5901 5902 5903
x11 = 6000,6001,6002,6003 # tcp 6000 6001 6002 6003
irc = 6666,6667,6668,6669 # tcp 6666 6667 6668 6669
gg = 8074 # tcp 8074
proxy = 8080 # tcp 8080
rcon = 27015,27960 # udp 27015 27960
ppp = 34827 # special case 😉 this is the Net Layer code
TN3270 = 23,992 # tcp 23 992#
# you can change the colors of the curses GUI.
# here is a list of values:
# 0 Black 4 Blue
# 1 Red 5 Magenta
# 2 Green 6 Cyan
# 3 Yellow 7 White
#
[curses]
color_bg = 0
color_fg = 7
color_join1 = 2
color_join2 = 4
color_border = 7
color_title = 3
color_focus = 6
color_menu_bg = 4
color_menu_fg = 7
color_window_bg = 4
color_window_fg = 7
color_selection_bg = 6
color_selection_fg = 6
color_error_bg = 1
color_error_fg = 3
color_error_border = 3#
# This section includes all the configurations that needs a string as a
# parmeter such as the redirect command for SSL mitm attack.
#
[strings]# the default encoding to be used for the UTF-8 visualization
utf8_encoding = “ISO-8859-1”# the command used by the remote_browser plugin
remote_browser = “xdg-open http://%host%url”# location of the GeoIP database file in case it’s not the standard location
# this is mostly necessary on Windows or if libgeoip is manually build
geoip_data_file = “/usr/local/share/GeoIP/GeoIP.dat”
geoip_data_file_v6 = “/usr/local/share/GeoIP/GeoIPv6.dat”#####################################
# redir_command_on/off
#####################################
# you must provide a valid script for your operating system in order to have
# the SSL dissection available
# note that the cleanup script is executed without enough privileges (because
# they are dropped on startup). so you have to either: provide a setuid program
# or set the ec_uid to 0, in order to be sure the cleanup script will be
# executed properly
# NOTE: the script must fit into one line with a maximum of 255 characters#—————
# Linux
#—————# if you use ipchains:
#redir_command_on = “ipchains -A input -i %iface -p tcp -s %source -d %destination %port -j REDIRECT %rport”
#redir_command_off = “ipchains -D input -i %iface -p tcp -s %source -d %destination %port -j REDIRECT %rport”# if you use iptables:
redir_command_on = “iptables -t nat -A PREROUTING -i %iface -p tcp -s %source -d %destination –dport %port -j REDIRECT –to-port %rport”
redir_command_off = “iptables -t nat -D PREROUTING -i %iface -p tcp -s %source -d %destination –dport %port -j REDIRECT –to-port %rport”#—————
# Mac Os X
#—————# if you use ipfw:
#redir_command_on = “ipfw -q add set %set fwd 127.0.0.1,%rport tcp from %source to %destination %port in via %iface”
#redir_command_off = “ipfw -q delete set %set”# if you use BSD PF:
#redir_command_on = “(pfctl -sn 2> /dev/null; echo ‘rdr pass on %iface inet proto tcp from %source to %destination port %port -> localhost port %rport’) | pfctl -f – 2> /dev/null”
#redir_command_off = “pfctl -Psn 2> /dev/null | egrep -v ‘inet .+ %source to %destination port = %port’ | pfctl -f – 2> /dev/null”# BSD PF for IPv6:
#redir6_command_on = “(pfctl -sn 2> /dev/null; echo ‘rdr pass on %iface inet6 proto tcp from %source to %destination port %port -> localhost port %rport’) | pfctl -f – 2> /dev/null”
#redir6_command_off = “pfctl -Psn 2> /dev/null | egrep -v ‘inet6 .+ %source to %destination port = %port’ | pfctl -f – 2> /dev/null”#—————
# FreeBSD
#—————# Before PF can be used, make sure the kernel module has been loaded by
#kldstat | grep pf.ko
. If the rusult is empty, you can load it by
#kldload pf.ko
or add ‘pf_enable=”YES”‘ to the /etc/rc.conf and reboot.# Check if the PF status is enabled by
#pfctl -si | grep Status | awk '{print $2;}'
. If “Disabled”, enable it with
#pfctl -e
.#redir_command_on = “(pfctl -sn 2> /dev/null; echo ‘rdr pass on %iface inet proto tcp from %source to %destination port %port -> localhost port %rport’) | pfctl -f – 2> /dev/null”
#redir_command_off = “pfctl -Psn 2> /dev/null | egrep -v ‘inet .+ %source to %destination port = %port’ | pfctl -f – 2> /dev/null”# pendant for IPv6
#redir6_command_on = “(pfctl -sn 2> /dev/null; echo ‘rdr pass on %iface inet6 proto tcp from %source to %destination port %port -> localhost port %rport’) | pfctl -f – 2> /dev/null”
#redir6_command_off = “pfctl -Psn 2> /dev/null | egrep -v ‘inet6 .+ %source to %destination port = %port’ | pfctl -f – 2> /dev/null”#—————
# Open BSD
#—————# unfortunately the pfctl command does not accepts direct rules adding
# you have to use a script which executed the following command:# —– cut here ——-
# #!/bin/sh
# rdr pass on $1 inet proto tcp from any to any port $2 -> localhost port $3 | pfctl -a sslsniff -f –
# —– cut here ——-# it’s important to remember that you need “rdr-anchor sslsniff” in your
# pf.conf in the TRANSLATION section.#redir_command_on = “the_script_described_above %iface %port %rport”
#redir_command_off = “pfctl -a sslsniff -Fn”# also, if you create a group called “pfusers” and have EC_GID be that group,
# you can do something like:
# chgrp pfusers /dev/pf
# chmod g+rw /dev/pf
# such that all users in “pfusers” can run pfctl commands; thus allowing non-root
# execution of redir commands.##########
# EOF #
##########sir I have done al sir did
June 30, 2020 at 4:15 am #41051Diego PérezModeratorHi!
Thanks, you have uncommented the correct lines.
Are you sure you are using the latest custom kali image provided by Zaid?Let me know.
DiegoJune 30, 2020 at 6:34 am #41058Ujjwal Reddy K SParticipantsir have reinstalled the latest version but also I am getting error
July 1, 2020 at 4:15 am #41121Diego PérezModeratorHi!
That’s weired, I have just tried it and works pretty well but when spoofing a target.In your first shared command you didn’t specified a target, was this because you don’t want to share the ips or you didn’t provide them to the command line?
Let me know.
DiegoJuly 1, 2020 at 7:43 am #41131Ujjwal Reddy K SParticipantI can’t specify the target as I told in the begin it does not open the window when I enter
ettercap -Tq ///
its show error
if I do the restore the command it will work but data no found on my computer
July 3, 2020 at 4:49 am #41280Diego PérezModeratorHi!
You have specify the ip addresses in command line, I would suggest to watch the lecture again so it gets clearer to you.Greetings!
Diego - AuthorPosts
- You must be logged in to reply to this topic.