Re: ettercap anyone?


Subject: Re: ettercap anyone?
From: Charlie Watts (cewatts@frontier.net)
Date: Mon Dec 03 2001 - 17:38:11 MST


Oh, -do- take this off of the YDL list, please. I shouldn't have responded
to the list myself earlier ... but this is really going to far.

On Mon, 3 Dec 2001, Reid Anderson wrote:

> PS- What exactly do you mean by "poison the ARP cache"?
>
>
> On Monday, December 3, 2001, at 06:42 PM, Cdowns wrote:
>
> > all you have to do is select the src as the machine you want to grab (
> > password ) and then dest as the gateway and hit "a" (for APR becuase
> > you
> > will need to poison the ARP cache of both machines on the keyboard) sit
> > back and wait. Cake walk. you could also use ngrep which will do this
> > very
> > easily.
> >
> > ~>D
> >
> > Reid Anderson wrote:
> >
> >> Has anyone used ettercap before? It is a packet sniffer that I am
> >> trying
> >> to use to prove to our silly College Email Admins that we need to use
> >> secure email passwords and that our web based email system is highly
> >> unsecure. I am trying to packet sniff my own machine first (it's a
> >> little more legal that way) and then I might just get the email admins
> >> password and send her a message from herself! Anyway, If anyone has
> >> used
> >> ettercap (or any other packet sniffer that might run under OS X), could
> >> you please tell me a little more about using it other than what it has
> >> in ettercap --help. I have been able to view thge html code being
> >> viewed by many people, but only within my own subnet 150.209.130.x
> >> but I
> >> would like to be able to see outside my subnet to the general domain
> >> 150.209.x.x. Any help would be greatly appreciated!
> >>
> >> Thanks
> >> Reid Anderson
> >> resander@cs.hamilton.edu
> >
>
>

-- 
Charlie Watts
cewatts@frontier.net
Frontier Internet
http://www.frontier.net/



This archive was generated by hypermail 2a24 : Mon Dec 03 2001 - 17:54:49 MST