LinuxCommandLibrary

ettercap

TLDR

Start graphical interface

$ ettercap -G
copy
ARP poisoning attack
$ ettercap -T -M arp:remote /[target1]// /[target2]//
copy
Sniff on interface
$ ettercap -T -i [eth0]
copy
Use text interface
$ ettercap -T
copy
Load plugin
$ ettercap -T -P [dns_spoof]
copy
Read from pcap file
$ ettercap -T -r [capture.pcap]
copy

SYNOPSIS

ettercap [options] [target1] [target2]

DESCRIPTION

Ettercap is a comprehensive suite for man-in-the-middle attacks on LAN. It supports active and passive protocol analysis, including features for network and host analysis.
The tool can intercept traffic through ARP poisoning, allowing packet sniffing, injection, and filtering. Plugins extend functionality for DNS spoofing, OS fingerprinting, and more.
Ettercap is used for network security testing, protocol analysis, and penetration testing on authorized networks.

PARAMETERS

TARGET

Target specification (MAC/IP/PORT).
-G
Graphical (GTK) interface.
-T
Text-only interface.
-M METHOD
MITM attack method.
-i INTERFACE
Network interface.
-P PLUGIN
Load plugin.
-r FILE
Read from pcap file.
-w FILE
Write to pcap file.
--help
Display help information.

CAVEATS

Only use on authorized networks. May disrupt network operations. Detectable by security tools. Some attacks need root privileges.

HISTORY

Ettercap was created by Alberto Ornaghi and Marco Valleri, released as open source for network security research. It became a standard tool for man-in-the-middle attack demonstrations.

SEE ALSO

Copied to clipboard