Ettercap – A Comprehensive Suite For Man In The Middle Attacks

Ettercap is a comprehensive suite for man in the middle attacks. It features sniffing of live connections, content filtering on the fly and many other interesting tricks. It supports active and passive dissection of many protocols and includes many features for network and host analysis.ETTERCAP OFFERS THREE INTERFACES, TRADITIONAL COMMAND LINE, GUI AND NCURSES.Supported DistributionsThese distributions have been tested in both 32 and 64 bit flavors where possibleDebian/Ubuntu (Includes derivatives such as Kali, BackTrack, Mint, etc)FedoraGentooPentooMac OSX (Snow Leopard & Lion)FreeBSDOpenBSDNetBSDUnsupported DistributionsInstallation may work on the following distributions, but are not supported. Additional settings may be required for compilation and/or useOpenSuSeSolarisWindows VistaWindows 7Windows 8DependenciesEttercap source compilation requires the following dependenciesLibpcap & dev librariesLibnet1 & dev librariesLibpthread & dev librariesZlibcLibtoolCMake 2.6FlexBisonSSL Dissection Required DependenciesLibSSL & dev librariesGTK Related DependenciesLibGTK & dev librariesNCurses Related DependenciesLibncurses & dev librariesFilter Related Regex DependenciesLibpcre & dev librariesWhen building from source, dependencies should be found in the supported distribution repositories. Try these first before acquiring from external dependency source pages. All supported builds have been tested with dependencies installed from the distribution repository. If you are running on debian, or any debian based distro you can install the required dependencies by running:sudo apt-get install debhelper cmake bison flex libgtk2.0-dev libltdl3-dev libncurses-dev libncurses5-dev\ libnet1-dev libpcap-dev libpcre3-dev libssl-dev libcurl4-openssl-dev ghostscript For running ettercap you might need to install ethtool, needed for disabling interface offloads.Download Ettercap

Link: http://feedproxy.google.com/~r/PentestTools/~3/KoCLGU7Y66o/ettercap-comprehensive-suite-for-man-in.html

htrace.sh – Simple Shell Script To Debugging HTTP/HTTPS Traffic Tracing, Response Headers And Mixed-Content

htrace.sh is a shell script that allows you to validate your domain configuration and catch any errors (e.g. redirect loops). It also displays basic information about the ssl configuration (if available), response headers, checks for mixed content and performs security scans using Nmap scripts and great external tools such as Ssllabs or Mozilla Observatory.FunctionsIt is useful for:checking properly domain configuration (web servers/reverse proxies) redirects analysis, e.g. to eliminate redirect loops checking response headers for each request checking basic ssl configuration validation of the certificates (date, cn, san) and verification ssl connectionscanning domain for Mixed Content scanning domain using Nmap NSE Library scanning domain with external security tools: Mozilla Observatory and SSL Labs API Before use htrace.sh please see Requirements.How To UseIt’s simple:# Clone this repositorygit clone https://github.com/trimstray/htrace.sh# Go into the repositorycd htrace.sh# Install./setup.sh install# Run the apphtrace.sh –domain https://google.comsymlink to bin/htrace.sh is placed in /usr/local/binman page is placed in /usr/local/man/man8External toolshtrace.sh support external tools for security scans:Mozilla Observatory – cli version of observatory.mozilla.orgwith params: –format=report –rescan –zero –quietSsllabs – command-line reference-implementation client for SSL Labs APIwith params: -quiet -grademixed-content-scan – cli tool for check HTTPS-enabled website for Mixed Contentwith params: -user-agent \”$_user_agent\" –no-check-certificateNmap NSE Library – provide automated security scans with Nmapwith scripts:http-auth-finderhttp-chronohttp-cookie-flagshttp-corshttp-cross-domain-policyhttp-csrfhttp-dombased-xsshttp-githttp-grephttp-internal-ip-disclosurehttp-jsonp-detectionhttp-malware-hosthttp-methodshttp-passwdhttp-phpself-xsshttp-php-versionhttp-robots.txthttp-sitemap-generatorhttp-shellshockhttp-stored-xsshttp-unsafe-output-escapinghttp-useragent-testerhttp-vhostshttp-xssedssl-enum-cipherswhois-ipIf you don’t know how to install these tools and where they should be placed, please see in Dockerfile where exactly every step is described.When scanning for mixed content and nmap scripting engine, remember that it may take a long time before the entire site is checked.ReportsIf you want to generate a report in html format, use the ansi2html.sh tool. A detailed description of use:htrace.sh -d https://nmap.org -s -h | ansi2html –bg=dark > report.htmlDockerThe configuration is contained in the build/Dockerfile.Build imagecd htrace.sh/builddocker build –rm -t htrace.sh -f Dockerfile .Run containerdocker run –rm -it –name htrace.sh htrace.sh -d http://nmap.org -hRequirementsThis tool working with:GNU/Linux (testing on Debian and CentOS)Bash (testing on 4.4.19)Curl with specific variables support (≥ 7.52.0)OpenSSLMozilla ObservatorySsllabsmixed-content-scanNmapParametersProvides the following options: htrace.sh v1.0.6Usage: htrace.sh