LinuxCommandLibrary

ettercap

Man-in-the-middle attack and network sniffing

SYNOPSIS

ettercap [-h] | [-V] | [-d] [-T|-C] [-i iface] [-M mitm[:size]] [-P plugin] [-f filter] [target1 [target2 [target3]]]

PARAMETERS

-h, --help
    Display help summary

-V, --version
    Show version information

-d, --daemon
    Daemon mode (background)

-q, --quiet
    Suppress all output

-u num, --user-limit=num
    Max users in daemon mode

-T, --text-only
    Text-only interface

-C, --curses
    Ncurses interface

-G, --gtk
    GTK interface (deprecated)

-i iface, --iface=iface
    Capture on specific interface

-I list, --ifname=list
    Select from interface list

-L file, --log=file
    Log to specific file

-f filter.ecf
    Load dissection filter

-F type
    Filter type (hex, pcap, etc.)

-P plugin
    Load plugin(s)

-M mitm[:size]
    MITM mode (arp, dhcp, etc.)

-m mode
    Activate MITM plugin

-p
    Promiscuous mode

-s
    Supersniffer mode

-N
    No DNS resolution

-z
    Saturate sniffers

-Z
    Auto-close connections

-o file
    Output to file

-r file
    Read from offline pcap file

-t file
    Read targets from file

-j file
    Join pcap files

-k file
    Keep dumping to pcap

-S
    SSL dissection

-D
    DNS spoofing

DESCRIPTION

Ettercap is a free, open-source network security tool designed for man-in-the-middle (MITM) attacks, packet sniffing, and protocol analysis. It enables interception and dissection of live network connections, content filtering on the fly, and injection of custom data. Supporting active and passive modes, it handles protocols like HTTP, FTP, SSH, and more, including sniffing credentials, SSL stripping, and ARP/DNS spoofing.

Primarily used by penetration testers and security professionals, Ettercap offers a text-based UI (TUI), ncurses interface, and legacy GTK GUI. It runs in promiscuous, daemon, or supersniffer modes, with plugin support for extensibility. Targeting uses intuitive syntax: // for the entire network, /192.168.1.1/ for a host, or //L for live hosts.

Key capabilities include ARP poisoning for traffic redirection, packet forging, and filtering via ECNF scripts. It logs sessions to files or databases. While powerful for vulnerability assessment, it requires root privileges and can disrupt networks if misused. Ethical use in controlled environments is essential to avoid legal issues.

CAVEATS

Requires root privileges; can cause network disruptions or DoS; illegal for unauthorized use on production networks. Not for beginners—risk of instability or detection.

TARGETING SYNTAX

// entire subnet
/IP/ single host
/IP/M/ IP and MAC
//L live hosts only
//R remote segment

INSTALLATION

Available in most distros: apt install ettercap-common ettercap-graphical or compile from source. Includes ettercap-common, etterfilter, ec_parse.

MITM EXAMPLES

ettercap -T -M arp:remote /target1/ /target2/ for ARP poisoning
ettercap -T -M dhcp /192.168.1.0/24/ for DHCP spoofing

HISTORY

First released in 2001 by Jean-Baptiste Condat and Riccardo Necchi as part of the Ettercap Project. Evolved to v0.7.x (2004) with GUI, v0.8.x (2010s) adding plugins and IPv6. Now maintained on GitHub; stable at 0.8.3.2 (2015), with forks for updates.

SEE ALSO

tcpdump(1), wireshark(1), arping(8), dsniff(8), aircrack-ng(8)

Copied to clipboard