Once in this position, the pirate can launch a lot of different very dangerous attacks because he/she is in the way between to two normal machines.
This is an attack where a pirate put its machine in the logical way between two machines speaking together as shown in the picture below. Plugins are also available for attacks such as DNS spoofing. provide fake SSL certificates in HTTPS sections to the victims. discover passwords for protocols such as FTP, HTTP, POP, SSH1, etc. infect, replace, delete data in a connection For those who do not like the Command ike Interface (CLI), it is provided with an easy graphical interface.Įttercap is able to perform attacks against the ARP protocol by positioning itself as 'man in the middle' and, once positioned as this, it is able to: On the Windows machine, with the help of Wireshark, we can compare the ARP traffic before and after the poisoning:Įttercap is a tool made by Alberto Ornaghi (ALoR) and Marco Valleri (NaGA) and is basically a suite for man in the middle attacks on a LAN.