First, setup the website clone using the social engineering toolkit

Configure the etter.conf file by setting the ec_uid and ec_gid into o and remove the “#” in the if you use iptables section.

Configure the etter.dns file to add the redirects so that if the victim’s search for, it will go to the attackers website.

Turn on ettercap and then do unified sniffing, choose the ‘eth0’ option and scan for hosts. After scanning for hosts, stop sniffing and set the victim’s IP as target1 and the gateway address as target2. Next, go to the mitm tab and do arp poisoning (use the sniff remote connections option). After that, go to the plugins, turn on dnsspoof and start sniffing


IP address of changes from the original IP address into the IP address of the attacker


Leave a Reply

Your email address will not be published. Required fields are marked *