Help with tutorial for ettercap-ng

Eric Gallager egall at gwmail.gwu.edu
Sat Dec 7 06:45:12 PST 2013


The ettercap-ng port has recently been moved back to just-plain "ettercap",
so you might want to try selfupdating and upgrading to the newest ettercap:
https://trac.macports.org/ticket/39266#comment:6

(also remember to "reply all" when responding to posts on the mailing list)



On Fri, Nov 22, 2013 at 7:10 PM, Alia Jemmali <alia.jemmali at gmail.com>wrote:

> Oh sorry! i forgot to put the link it's in hackmac this one forum
> http://www.hackmac.org/forum/topic/1996-how-to-run-a-mitm-attack-arp-spoofing/
> .
> And the second that i tried which is in the commend line (terminal) sudo
> ettercap -C -i en1.
> Both of them didn't work for me.
> Thanks for ur help again
>
>
> 2013/11/22 Eric Gallager <egall at gwmail.gwu.edu>
>
>> So I'm still unclear... which tutorial is this again? I don't think you
>> ever provided a link to it... It's kind of hard to reproduce what you're
>> trying to do when I'm not sure what exactly that even is...
>>
>>
>>
>> On Thu, Nov 21, 2013 at 8:17 PM, Alia Jemmali <alia.jemmali at gmail.com>wrote:
>>
>>> SORRY actually when i check for the poisoning succes it says no
>>> poisoning :S
>>>
>>>
>>> 2013/11/22 Alia Jemmali <alia.jemmali at gmail.com>
>>>
>>>> ok so i'h updated the version add the plugins and tried again.
>>>> So now it's says the poisoning is successful; but when it comes to
>>>> gather information from the victim machine i don't receive anything how
>>>> could you explain this? That's why i'h asked if ettercap really work!!!!
>>>>
>>>>
>>>> 2013/11/22 Alia Jemmali <alia.jemmali at gmail.com>
>>>>
>>>>> thank you but i wanna know does it works for U i mean does ettercap an
>>>>> effective device does it give result on Mac?
>>>>>
>>>>>
>>>>>
>>>>> 2013/11/22 Eric Gallager <egall at gwmail.gwu.edu>
>>>>>
>>>>>> The ettercap-ng port is kind of out of date, so you might want to get
>>>>>> on cc for the ticket to update it:
>>>>>> https://trac.macports.org/ticket/39266
>>>>>> In the meantime, you can try and see if installing it with either the
>>>>>> +gtk or +plugins variants (or both) helps at all.
>>>>>>
>>>>>>
>>>>>> On Thu, Nov 21, 2013 at 5:36 PM, Alia Jemmali <alia.jemmali at gmail.com
>>>>>> > wrote:
>>>>>>
>>>>>>> ettercap-ng @0.7.3_5 (active)
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>> 2013/11/21 Eric Gallager <egall at gwmail.gwu.edu>
>>>>>>>
>>>>>>>> Which of the ettercap ports are you using? MacPorts has 2 different
>>>>>>>> versions: ettercap and ettercap-ng. You can find this out with `port
>>>>>>>> installed ettercap*`, which will also show which variants you have them
>>>>>>>> installed with. I'm adding the maintainer of ettercap-ng on cc for this in
>>>>>>>> case he has any other tips...
>>>>>>>>
>>>>>>>>
>>>>>>>>
>>>>>>>> On Thu, Nov 21, 2013 at 4:35 PM, Alia Jemmali <
>>>>>>>> alia.jemmali at gmail.com> wrote:
>>>>>>>>
>>>>>>>>> Hi everyone
>>>>>>>>> i was wondering if anyone know and can help me with How to Run a
>>>>>>>>> MitM Attack [ARP Spoofing] or how to use ettercap on Mac mountain lion
>>>>>>>>> PS: i'h tried this Tuto everything was running well, execpt i
>>>>>>>>> can't find the transmited datta; because it's say destination is at
>>>>>>>>> spoofed(your) MAC address, which is something that i don't know how to do.
>>>>>>>>> So what should i do do you have better effective tuto or help with
>>>>>>>>> this one
>>>>>>>>> thank you
>>>>>>>>>
>>>>>>>>> _______________________________________________
>>>>>>>>> macports-users mailing list
>>>>>>>>> macports-users at lists.macosforge.org
>>>>>>>>> https://lists.macosforge.org/mailman/listinfo/macports-users
>>>>>>>>>
>>>>>>>>>
>>>>>>>>
>>>>>>>
>>>>>>
>>>>>
>>>>
>>>
>>
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.macosforge.org/pipermail/macports-users/attachments/20131207/3157eff1/attachment.html>


More information about the macports-users mailing list