1.安裝ettercap
brew install ettercap --with-gtk+
2.啟動(dòng)ettercap
![Uploading 1DAA36FF-2321-4F54-9478-4083A5F89D78_847247.png . . .]
3.選中en1無(wú)線網(wǎng)卡
DB7F465A-8D44-43AC-B9FB-8604D6BCA2F0.png
4.點(diǎn)擊菜單Targets,選中Curren tatgets
![Uploading A4DDEB8C-C0F2-4A0A-A39C-B2F9245B23CC_012569.png . . .]
5.Target 1填上連上你wifi熱點(diǎn)上的ip地址, Target2填上你mac機(jī)器上的網(wǎng)關(guān)地址
6.點(diǎn)擊菜單Logging,填上log位置名字,如我的log日志叫hahaha.log放在/tmp文件下,點(diǎn)擊保存
A08105F4-F88A-4EFA-9DC1-9A454FDF9D6D.png
7.選中菜單Mitm
A08105F4-F88A-4EFA-9DC1-9A454FDF9D6D.png
8.開(kāi)始嗅探
image.png
9.打開(kāi)路由轉(zhuǎn)發(fā)功能,在終端下輸入
sudo sysctl -w net.inet.ip.forwarding=1
10.查看log信息
cd /tmp
etterlog cai.log.ecp
就可以查看你偷取的隱私啦