Ettercap (computing)

From Wikipedia, the free encyclopedia

Ettercap
Design by ALoR and NaGA
Initial release January 25, 2001
Latest release NG-0.7.3 / May 29, 2005 (2005-05-29); 1113 days ago
Written in C
OS Cross-platform
Available in English
Development status Active
Genre Computer security
License GNU General Public License
Website ettercap.sourceforge.net

Ettercap is an open source software Unix tool for computer network protocol analysis and security cracking. It is capable of intercepting traffic on a network segment, capturing passwords, and conducting man-in-the-middle attacks against a number of common protocols.

It is free software, licensed under the terms of the GNU General Public License.

[edit] Features

Ettercap supports active and passive dissection of many protocols (including ciphered ones) and provides many features for network and host analysis. Ettercap offers four modes of operation:

  • IP-based: packets are filtered based on IP source and destination.
  • MAC-based: packets are filtered based on MAC address, useful for sniffing connections through a gateway.
  • ARP-based: uses ARP poisoning to sniff on a switched LAN between two hosts (full-duplex).
  • PublicARP-based: uses ARP poisoning to sniff on a switched LAN from a victim host to all other hosts (half-duplex).

In addition, the software also offers the following features:

  • Character injection into an established connection: characters can be injected into a server (emulating commands) or to a client (emulating replies) while maintaining a live connection.
  • SSH1 support: the sniffing of a username and password, and even the data of an SSH1 connection. Ettercap is the first software capable of sniffing an SSH connection in full duplex.
  • HTTPS support: the sniffing of HTTP SSL secured data--even when the connection is made through a proxy.
  • Plug-in support: creation of custom plugins using Ettercap's API.
  • Packet filtering/dropping: setting up a filter that searches for a particular string (or hexadecimal sequence) in the TCP or UDP payload and replaces it with a custom string/sequence of choice, or drops the entire packet.
  • Kill a connection: killing connections of choice from the connections-list.
  • Passive scanning of the LAN: retrieval of information about hosts on the LAN, their open ports, the version numbers of available services, the type of the host (gateway, router or simple PC) and estimated distances in number of hops.

Ettercap also has the ability to actively or passively find other poisoners on the LAN.

[edit] External links