Update bettercap-cheatsheet.md

main
$./Netrunner_& 1 year ago committed by GitHub
parent 742b927fe5
commit 9a174579fc
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

@ -1,3 +1,5 @@
Here is the Bettercap cheatsheet in Markdown format with emojis:
# 🕵️‍♀️ **Bettercap Cheatsheet** 🕵️ # 🕵️‍♀️ **Bettercap Cheatsheet** 🕵️
Bettercap is an indispensable tool for network reconnaissance, sniffing, and executing Man-In-The-Middle (MITM) attacks on local networks. Bettercap is an indispensable tool for network reconnaissance, sniffing, and executing Man-In-The-Middle (MITM) attacks on local networks.
@ -5,9 +7,10 @@ Bettercap is an indispensable tool for network reconnaissance, sniffing, and exe
--- ---
## Table of Contents ## Table of Contents
1. [🔍 Network Reconnaissance](#-network-reconnaissance) 1. [🔍 Network Reconnaissance](#-network-reconnaissance)
2. [🥷 ARP Spoofing](#-arp-spoofing) 2. [🥷 ARP Spoofing](#-arp-spoofing)
3. [📡 Network Sniffing](#-network-sniffing) 3. [📡 Network Sniffing](#-network-sniffing)
4. [🕸 Web Proxy](#-web-proxy) 4. [🕸 Web Proxy](#-web-proxy)
5. [🚦 TLS Proxy](#-tls-proxy) 5. [🚦 TLS Proxy](#-tls-proxy)
6. [🌀 DNS Spoofing](#-dns-spoofing) 6. [🌀 DNS Spoofing](#-dns-spoofing)
@ -19,72 +22,97 @@ Bettercap is an indispensable tool for network reconnaissance, sniffing, and exe
## 🔍 **Network Reconnaissance** ## 🔍 **Network Reconnaissance**
- `net.probe on` 👀 - `net.probe on` 👀
- Initiate an ARP scan to discover live hosts on the network.
- `net.show` 📡 - Initiate an ARP scan to discover live hosts on the network.
- Display detected devices on the network, complete with IPs, MAC addresses, and other details.
- `net.show` 📡
- Display detected devices on the network, complete with IPs, MAC addresses, and other details.
- `net.recon on/off` 🕵️‍♂️ - `net.recon on/off` 🕵️‍♂️
- Enable/disable passive network traffic analysis to discover hosts.
- Enable/disable passive network traffic analysis to discover hosts.
--- ---
## 🥷 **ARP Spoofing** ## 🥷 **ARP Spoofing**
- `set arp.spoof.targets [IP]` - `set arp.spoof.targets [IP]`
- Designate a target IP for ARP cache poisoning to reroute its traffic.
- Designate a target IP for ARP cache poisoning to reroute its traffic.
- `arp.spoof on/off` 💥 - `arp.spoof on/off` 💥
- Engage/disengage ARP spoofing against the chosen target.
- Engage/disengage ARP spoofing against the chosen target.
- `set arp.spoof.internal true` 🔁 - `set arp.spoof.internal true` 🔁
- Poison ARP caches for all connections between internal hosts on the LAN.
- Poison ARP caches for all connections between internal hosts on the LAN.
--- ---
## 📡 **Network Sniffing** ## 📡 **Network Sniffing**
- `net.sniff on/off` ▶️⏸️ - `net.sniff on/off` ▶️⏸️
- Begin/halt packet capture to log network traffic.
- Begin/halt packet capture to log network traffic.
--- ---
## 🕸 **Web Proxy** ## 🕸 **Web Proxy**
- `set proxy.port [PORT]` 🤖 - `set proxy.port [PORT]` 🤖
- Assign the listening port for the proxy server.
- Assign the listening port for the proxy server.
- `proxy on/off` 🎚️🛑 - `proxy on/off` 🎚️🛑
- Activate/deactivate the proxy server to intercept and manipulate HTTP requests.
- Activate/deactivate the proxy server to intercept and manipulate HTTP requests.
--- ---
## 🚦 **TLS Proxy** ## 🚦 **TLS Proxy**
- `tls.proxy on/off` 🔓🔒 - `tls.proxy on/off` 🔓🔒
- Enable/disable the TLS proxy. This intercepts and decrypts HTTPS traffic by mimicking certificate validation.
- Enable/disable the TLS proxy. This intercepts and decrypts HTTPS traffic by mimicking certificate validation.
--- ---
## 🌀 **DNS Spoofing** ## 🌀 **DNS Spoofing**
- `set dns.spoof.domains [DOMAIN]` 🌐 - `set dns.spoof.domains [DOMAIN]` 🌐
- Select a domain for DNS hijacking.
- Select a domain for DNS hijacking.
- `dns.spoof on` 🥷 - `dns.spoof on` 🥷
- Activate DNS response spoofing for the specified domain.
- Activate DNS response spoofing for the specified domain.
--- ---
## 💻 **HTTPS & HSTS Bypass** ## 💻 **HTTPS & HSTS Bypass**
- `hstshijack.load` 🛡️ - `hstshijack.load` 🛡️
- Load the module to overcome HSTS, a web security protocol, useful for exploiting HTTPS sites.
- Load the module to overcome HSTS, a web security protocol, useful for exploiting HTTPS sites.
--- ---
## 📌 **Miscellaneous Commands** ## 📌 **Miscellaneous Commands**
- `events.clear` 🧹 - `events.clear` 🧹
- Wipe out all recorded network events.
- Wipe out all recorded network events.
- `set [OPTION] [VALUE]` ⚙️ - `set [OPTION] [VALUE]` ⚙️
- Adjust configuration options to suit your needs.
- Adjust configuration options to suit your needs.
- `help` - `help`
- Display the help menu with an overview of commands.
- Display the help menu with an overview of commands.
--- ---
Let me know if you need any changes to the formatting!

Loading…
Cancel
Save