# Bettercap
**************
## Bettercap包描述
**************
Bettercap是一款適用于網絡攻擊和監控的瑞士軍刀。這是一個用于網絡捕獲,分析和MIMT攻擊的網絡安全工具。
[Lynis 主頁](https://www.bettercap.org/)
[Kali Bettercap倉庫](https://git.kali.org/gitweb/?p=packages/bettercap.git;a=summary)
[資料來源](https://github.com/bettercap/bettercap)
作者:Bettercap dev team
許可:GPLv3
***************
### Bettercap包中包含的工具
Bettercap——用于網絡攻擊和監控的瑞士軍刀。
```
root@kali:~# bettercap -h
Usage of bettercap:
-autostart string
逗號分隔的模塊列表會自動啟動 (默認 "events.stream, net.recon")
-caplet string
從此文件中讀取命令并在交互式會話中執行他們
-cpu-profile file
寫入cpu配置
-debug
打印調試信息
-env-file string
從選定的文件中加載環境變量, 設為空值去禁用持續維持的環境
-eval string
在交互式會話中,使用命令行設置變量,運行一個或者多個命令并使用;隔開
-iface string
綁定網絡接口, 如果為空,接口會自動選定默認值
-mem-profile file
寫入內存配置
-no-colors
禁用輸出顏色效果
-no-history
禁用交互式會話歷史記錄文件
-silent
禁止輸出(記錄)所有非錯誤的日志
```
### bettercap用法示例
以靜默模式掃描系統(-Q),并以cronjob格式(-cronjob)輸出:
```
root@kali:~# bettercap
bettercap v2.11 (type 'help' for a list of commands)
172.16.10.0/24 > 172.16.10.212 ? [12:34:15] [endpoint.new] endpoint 172.16.10.254 detected as 00:50:56:01:33:70 (VMware, Inc.).
172.16.10.0/24 > 172.16.10.212 ? help
help MODULE : 如果沒有模塊名提供,則列出可用命令或者顯示模塊的特定幫助信息
active : 顯示活動模塊的相關信息
quit : 關閉會話并退出
sleep SECONDS : 休眠一段時間(休眠所給出的秒數)
get NAME : 獲取一個變量名的值
set NAME VALUE : 設置一個變量名的值
read VARIABLE PROMPT : 顯示一個提示來詢問用戶輸入,并將其保存在變量中
clear : 清空屏幕中的信息
include CAPLET : 在當前會話中加載并運行CAPLET
! COMMAND : 執行shell命令并且將其輸出到屏幕。
alias MAC NAME : 給一個已知MAC地址的終端設定一個別名
模塊:
any.proxy > not running
api.rest > not running
arp.spoof > not running
ble.recon > not running
caplets > not running
dhcp6.spoof > not running
dns.spoof > not running
events.stream > running
gps > not running
http.proxy > not running
http.server > not running
https.proxy > not running
mac.changer > not running
mysql.server > not running
net.probe > not running
net.recon > running
net.sniff > not running
packet.proxy > not running
syn.scan > not running
tcp.proxy > not running
ticker > not running
update > not running
wifi > not running
wol > not running
172.16.10.0/24 > 172.16.10.212 ? net.show
+-----------------+--------------------+----------+-------------------------+---------+---------+------------+
| IP | MAC | Name | Vendor | Sent | Recvd | Last Seen |
+-----------------+--------------------+----------+-------------------------+---------+---------+------------+
| 172.16.10.212 | 00:b0:52:af:4a:50 | eth0 | Atheros Communications | 0 B | 0 B | 12:34:15 |
| 172.16.10.2 | 00:50:56:13:37:0a | gateway | VMware, Inc. | 49 kB | 20 kB | 12:34:15 |
| | | | | | | |
| 172.16.10.254 | 00:50:56:01:33:70 | | VMware, Inc. | 2.4 kB | 2.4 kB | 12:35:15 |
+-----------------+--------------------+----------+-------------------------+---------+---------+------------+
↑ 0 B / ↓ 3.2 MB / 11354 pkts / 0 errs
```
- Information Gathering
- acccheck
- ace-voip
- Amap
- Automater
- bing-ip2hosts
- braa
- CaseFile
- CDPSnarf
- cisco-torch
- Cookie Cadger
- copy-router-config
- DMitry
- dnmap
- dnsenum
- dnsmap
- DNSRecon
- dnstracer
- dnswalk
- DotDotPwn
- enum4linux
- enumIAX
- Fierce
- Firewalk
- fragroute
- fragrouter
- Ghost Phisher
- GoLismero
- goofile
- hping3
- InTrace
- iSMTP
- lbd
- Maltego Teeth
- masscan
- Metagoofil
- Miranda
- nbtscan-unixwiz
- Nmap
- ntop
- p0f
- Parsero
- Recon-ng
- SET
- smtp-user-enum
- snmp-check
- sslcaudit
- SSLsplit
- sslstrip
- SSLyze
- THC-IPV6
- theHarvester
- TLSSLed
- twofi
- URLCrazy
- Wireshark
- WOL-E
- Xplico
- Vulnerability Analysis
- BBQSQL
- BED
- cisco-auditing-tool
- cisco-global-exploiter
- cisco-ocs
- cisco-torch
- copy-router-config
- Doona
- Exploitation Tools
- Wireless Attacks
- Ghost-Phisher
- mfoc
- Forensics Tools
- Binwalk
- bulk-extractor
- Web Applications
- apache-users
- BurpSuite
- sqlmap
- w3af
- Sniffing-Spoofing
- Bettercap
- Burp Suite
- DNSChef
- Fiked
- hamster-sidejack
- HexInject
- Password Attacks
- crunch
- hashcat
- John the Ripper
- Johnny
- Hardware Hacking
- android-sdk
- apktool
- Arduino
- dex2jar
- Sakis3G
- Reverse Engineering
- apktool