May 15, 2012 in Videos
The method that used is, an ARP poisoning, but with iptables enabled from the etter.conf file. This will create a fake security certificate based off of a real one. When the victim machine types in username and password information, it is captured by ettercap with no encryption. Even though the victim is at a secure site or secure login, it does not matter.