URLsnarf

The ettercap is one of our favorite tool for MITM attack, why? because ettercap is super simple to use.

[LETS MAKE IT WORK]

#1) Open terminal & type:
assault@kalivm:~$ sudo ettercap -G

*You will get this*

etter-2

 

*Inside ettercap, do the following thing*

 

*A = Hit CTRL+U or Go to: Sniff > Unified sniffing | Chose you Interface (eth or Wlan)*

etter-3

*B = Hit CTRL+S or Go to: Hosts > Scan for hosts*

etter-4

*C = Hit CTRL+H or Go to: Hosts > Hosts List. Add your Gateway to Target 1 & your victim to Target 2*

etter-5

D = At the menu Go to: Mitm > ARP poisoning & check: Sniff remore connectios.

etter-6

*Now, Once we will tap OK, we will get this output at the bottom of ettercap*

etter-7

*E = Hit SHIFT+CTRL+W or go to: Start > Start sniffing & and the output at the bottom will be*

etter-8

#2) Open another terminal tab & type:
assault@kalivm:~$ sudo urlsnarf -i eth0

*And we will get this*

url_snarf

 

*Once the target will start to browse on his PC, a list of web addresses will start to popup at the URLsnarf window*

 

*BTW, you can view the IP address that target’s browse to, just hit SHIFT+CTRL+C or go to: View > Connections*

etter-9

 

ENJOY! 🙂

 

 

Here is and example by Gamer Forever