Unidirectional sniffing: Victim to Gateway
A more sensible and stealthy command is:
ettercap -T -M arp:oneway,remote /1.2.3.4/ /1.2.0.0/ |
ettercap -T -M arp:oneway,remote /1.2.3.4/ /1.2.0.0/ |
$ sudo ufw limit OpenSSH
If ufw is not installed, do this and try again:$ sudo aptitude install ufw
Many attackers will try to use your SSH server to brute-force passwords. This will only allow 6 connections every 30 seconds from the same IP address. sudo apt-get install ubuntu-restricted-extras
3 install ubuntu tweak
sudo chmod +x wifite.py
run:
sudo python wifite.py