Closed danetrain closed 6 years ago
Are you routing traffic from other hosts through your machine through perhaps ARP spoofing? That's the only way it would sniff traffic that isn't on the machine you're running it on.
Yes, I've been working on pairing it up with ARP spoofing through the MITMf library, but that installation isn't straightforward, and it looks like the installation instructions are out of date. What script/utility do you typically pair with net-creds when you're using it?
MITMf actually uses net-creds automatically so you should try installing that tool. Otherwise, I suppose you could use bettercap or ettercap or arpspoof from the dsniff suite.
On Tue, Feb 16, 2016 at 1:20 PM, danetrain notifications@github.com wrote:
Yes, I've been working on pairing it up with ARP spoofing through the MITMf library, but that installation isn't straightforward, and it looks like the installation instructions are out of date. What script/utility do you typically pair with net-creds when you're using it?
— Reply to this email directly or view it on GitHub https://github.com/DanMcInerney/net-creds/issues/19#issuecomment-184861199 .
Hello, I'm running this script on Ubuntu and it doesn't capture anything except traffic from the machine on which the script is running. I've tried enabling promiscuous mode on my wireless interface but that doesn't seem to change anything. Has anyone else seen this / have any mitigations?