bettercap
Network attack and monitoring framework
TLDR
Start interactive session
SYNOPSIS
bettercap [options]
DESCRIPTION
bettercap is a powerful network attack and monitoring framework. It provides tools for man-in-the-middle attacks, network reconnaissance, packet sniffing, credential harvesting, and WiFi attacks through a modular architecture.
The tool is designed for security research, penetration testing, and network analysis.
PARAMETERS
-iface name
Network interface-caplet file
Run caplet script-eval code
Evaluate expression-env-file file
Load environment variables-debug
Enable debug logging-silent
Suppress banner and logs
MODULES
net.recon
Network reconnaissancenet.probe
Active host discoveryarp.spoof
ARP spoofing attacksdns.spoof
DNS spoofinghttp.proxy
HTTP transparent proxyhttps.proxy
HTTPS transparent proxywifi
WiFi attacks and monitoringble
Bluetooth Low Energy attackspacket.proxy
Raw packet manipulation
INTERACTIVE COMMANDS
> set arp.spoof.targets 192.168.1.0/24
> arp.spoof on
# HTTP proxy with SSL stripping
> set http.proxy.sslstrip true
> http.proxy on
# Network scan
> net.probe on
> net.show
CAPLETS
Scripts for automation:
net.probe on
sleep 10
net.show
CAVEATS
Requires root privileges. Illegal without authorization. Can disrupt network traffic. Detection by IDS/IPS systems. WiFi attacks require monitor mode capable adapter. Use only in authorized security assessments.
HISTORY
bettercap was created by Simone Margaritelli (evilsocket) in 2016 as a modern replacement for ettercap, rewritten in Go for better performance.
SEE ALSO
ettercap(8), aircrack-ng(1), wireshark(1)
