搞事肯定得确认目标。所以我们得先确认一个目标
确认目标这种事情不多说。
1.开启IP转发
echo 1 > /proc/sys/net/ipv4/ip_forward
![](https://images2017.cnblogs.com/blog/1174022/201802/1174022-20180213162744859-333090573.png)
然后ettercap -G 进入(ettercap GUI界面)
![](https://images2017.cnblogs.com/blog/1174022/201802/1174022-20180213162840312-1335779409.png)
首先我们得选择好网卡
![](http://s1.knowsky.com/20150728/iexvtuxz2ig40.png)
然后进行IP扫描
![](https://images2017.cnblogs.com/blog/1174022/201802/1174022-20180213162915140-236310288.png)
扫描完成后
列出IP
![](https://images2017.cnblogs.com/blog/1174022/201802/1174022-20180213162926874-585350270.png)
然后实施中间人攻击(arp欺骗)
中间人攻击原理:
1.对目标主机发送欺骗,声称主机是网关
2.转发目标的NAT数据网关,维持目标外的外出数据
3.对网关进行ARP欺骗,声称自己是目标主机。
4.转发网关的NAT数据到目标主机,维持目标的接受数据
5.监听劫持或者修改目标的进入和外出数据,从而实现攻击
![](https://images2017.cnblogs.com/blog/1174022/201802/1174022-20180213162943249-1141102330.png)
开始攻击
![](https://images2017.cnblogs.com/blog/1174022/201802/1174022-20180213162956577-713303821.png)
driftnet -i eth0
urlsnarf -i eth0
![](https://images2017.cnblogs.com/blog/1174022/201802/1174022-20180213163009468-1904682204.png)
开启wireshark
![](https://images2017.cnblogs.com/blog/1174022/201802/1174022-20180213163053437-2043951505.png)
然后就可以开始监听妹子了