When it comes to Network Security, my philosophy is - "You can't afford to know less than the Hacker." This means that in order to protect ourselves effectively, we need to understand and experience the same tools and techniques that are used against us.
NOTE: ARP spoofing could cause damage to your network!
Ettercap 0.6.b - A multipurpose sniffer over switched LANs
Ettercap was born as a sniffer for switched LAN (and obviously even
"hubbed" one), but during the development process it has gained more
and more features that have changed it to a powerful and flexible tool
for man-in-the-middle attacks. It supports active and passive dissec-
tion of many protocols (even ciphered ones) and includes many features
for network and host analysis (such as OS fingerprint).
It has five sniffing methods:
+ IPBASED, the packets are filtered matching IP:PORT source and IP:PORT
+ MACBASED, packets filtered matching the source and dest MAC address.
(useful to sniff connections through gateway)
+ ARPBASED, uses arp poisoning to sniff in switched LAN between two
hosts (full-duplex m-i-t-m).
+ SMARTARP, uses arp poisoning to sniff in switched LAN from a victim
host to all other hosts knowing the entire list of the hosts (full-
+ PUBLICARP, uses arp poison to sniff in switched LAN from a victim
host to all other hosts (half-duplex).
With this method the ARP replies are sent in broadcast, but if ettercap
has the complete host list (on start up it has scanned the LAN) SMAR-
TARP method is automatically selected, and the arp replies are sent to
all the hosts but the victim, avoiding conflicting MAC addresses as
reported by win2K.
The most relevant ettercap features are:
Characters injection in an established connection : you can inject
character to server (emulating commands) or to client (emulating
replies) maintaining the connection alive !!
SSH1 support : you can sniff User and Pass, and even the data of an
SSH1 connection. ettercap is the first software capable to sniff an SSH
connection in FULL-DUPLEX
HTTPS support : you can sniff http SSL secured data... and even if the
connection is made through a PROXY
Remote traffic sniffing through GRE tunnel: you can sniff remote traf-
fic through a GRE tunnel from a remote cisco router and make mitm
attack on it
Plug-ins support : You can create your own plugin using the ettercap's
Password collector for : TELNET, FTP, POP, RLOGIN, SSH1, ICQ, SMB,
MySQL, HTTP, NNTP, X11, NAPSTER, IRC, RIP, BGP, SOCKS 5, IMAP 4, VNC,
LDAP, NFS, SNMP, HALF LIFE, QUAKE 3, MSN, YMSG (other protocols coming
Packet filtering/dropping: You can set up a filter chain that search
for a particular string (even hex) in the TCP or UDP payload and
replace it with yours or drop the entire packet.
Passive OS fingerprint: you scan passively the lan (without sending any
packet) and gather detailed info about the hosts in the LAN: Operating
System, running services, open ports, IP, mac address and network
OS fingerprint: you can fingerprint the OS of the victim host and even
its network adapter (it uses the nmap (c) Fyodor database)
Kill a connection: from the connections list you can kill all the con-
nections you want
Packet factory: You can create and sent packet forged on the fly. The
factory let you to forge from Ethernet header to application level.
Bind sniffed data to a local port You can connect to that port with a
client and decode unknown protocols or inject data to it (only in arp
For more check - man ettercap (For more Information)
Also check Nmap and tcpdump for Network scan and Checking TCP Traffic.
Example of the same I have pasted below
Using Nmap to find hosts that are up in your network
[root@mybox sriram]# nmap -sP 10.10.93.0/24
Starting nmap 3.30 ( http://www.insecure.org/nmap/ ) at 2006-01-08 03:25 EST
Host 10.10.93.0 seems to be a subnet broadcast address (returned 1 extra pings).
Host 10.10.93.94 appears to be up.
Host 10.10.93.118 appears to be up.
Host mybox.sriram.com (10.10.93.220) appears to be up.
Host 10.10.93.250 appears to be up.
Host 10.10.93.252 appears to be up.
Host 10.10.93.255 seems to be a subnet broadcast address (returned 1 extra pings).
Nmap run completed -- 256 IP addresses (5 hosts up) scanned in 75.751 seconds
Using TcpDump to listen a particular port
[root@mybox sriram]# tcpdump -n -ieth0:1 tcp port ssh and host 192.168.0.20
tcpdump: listening on eth0:1
03:32:20.704268 192.168.0.20.1044 > 192.168.0.10.22: . ack 87532615 win 62952 (DF)
03:32:20.704316 192.168.0.10.22 > 192.168.0.20.1044: P 1:69(68) ack 0 win 16080 (DF) [tos 0x10]
For more options check
- man nmap
- man tcpdump