Description: The method that used is, an ARP poisoning, but with iptables enabled from the etter.conf file. This will create a fake security certificate based off of a real one. When the victim machine types in username and password information, it is captured by ettercap with no encryption. Even though the victim is at a secure site or secure login, it does not matter.
Tags: ARP Poisoning , certificate , password , ettercap ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.
great video would love to see some more on how to use the different features of ettercap. Thanks again.