DanMcInerney / net-creds

Sniffs sensitive data from interface or pcap
GNU General Public License v3.0
1.65k stars 432 forks source link

No sniffing happening with Ubuntu #19

Closed danetrain closed 6 years ago

danetrain commented 8 years ago

Hello, I'm running this script on Ubuntu and it doesn't capture anything except traffic from the machine on which the script is running. I've tried enabling promiscuous mode on my wireless interface but that doesn't seem to change anything. Has anyone else seen this / have any mitigations?

DanMcInerney commented 8 years ago

Are you routing traffic from other hosts through your machine through perhaps ARP spoofing? That's the only way it would sniff traffic that isn't on the machine you're running it on.

danetrain commented 8 years ago

Yes, I've been working on pairing it up with ARP spoofing through the MITMf library, but that installation isn't straightforward, and it looks like the installation instructions are out of date. What script/utility do you typically pair with net-creds when you're using it?

DanMcInerney commented 8 years ago

MITMf actually uses net-creds automatically so you should try installing that tool. Otherwise, I suppose you could use bettercap or ettercap or arpspoof from the dsniff suite.

On Tue, Feb 16, 2016 at 1:20 PM, danetrain notifications@github.com wrote:

Yes, I've been working on pairing it up with ARP spoofing through the MITMf library, but that installation isn't straightforward, and it looks like the installation instructions are out of date. What script/utility do you typically pair with net-creds when you're using it?

— Reply to this email directly or view it on GitHub https://github.com/DanMcInerney/net-creds/issues/19#issuecomment-184861199 .