Getting Started with Bettercap

Installation

To begin using Bettercap, you'll need to install it first. Here's how:

install bettercap
sudo bettercap

Network Probing

The net.probe command is essential for discovering devices on your network. When activated, it automatically starts net.recon and begins probing addresses on your network.

net.probe on
				
192.168.88.0/24 > 192.168.88.81  » net.probe on 
			
192.168.88.0/24 > 192.168.88.81  » [21:26:59] [sys.log] [inf] net.probe starting net.recon as a requirement for net.probe
192.168.88.0/24 > 192.168.88.81  » [21:26:59] [sys.log] [inf] net.probe probing 256 addresses on 192.168.88.0/24
192.168.88.0/24 > 192.168.88.81  » [21:26:59] [endpoint.new] endpoint 192.168.88.1 detected as 76:ac:b9:1f:38:2a.
192.168.88.0/24 > 192.168.88.81  » [21:27:01] [endpoint.new] endpoint 192.168.88.138 detected as bc:24:11:8c:a4:60.
192.168.88.0/24 > 192.168.88.81  » [21:27:01] [endpoint.new] endpoint 192.168.88.171 detected as 6c:4b:90:58:0f:9a (LiteON).
			
	192.168.88.0/24 > 192.168.88.81  » net.show

		┌────────────────┬───────────────────┬─────────┬────────┬───────┬───────┬──────────┐
		│      IP ▴      │        MAC        │  Name   │ Vendor │ Sent  │ Recvd │   Seen   │
		├────────────────┼───────────────────┼─────────┼────────┼───────┼───────┼──────────┤
		│ 192.168.88.81  │ bc:24:11:65:a7:75 │ ens18   │        │ 0 B   │ 0 B   │ 21:26:54 │
		│                │                   │         │        │       │       │          │
		│ 192.168.88.1   │ 76:ac:b9:1f:38:2a │         │        │ 699 B │ 384 B │ 21:27:04 │
		│ 192.168.88.138 │ bc:24:11:8c:a4:60 │ debian. │        │ 120 B │ 92 B  │ 21:27:01 │
		│ 192.168.88.171 │ 6c:4b:90:58:0f:9a │         │ LiteON │ 120 B │ 92 B  │ 21:27:01 │
		└────────────────┴───────────────────┴─────────┴────────┴───────┴───────┴──────────┘
		
		
			

This will output information about discovered devices, including their IP addresses and MAC addresses.

Viewing Network Information

To see all discovered devices and their details, use the net.show command. This displays a comprehensive table with:

  • IP Addresses
  • MAC Addresses
  • Device Names
  • Vendors
  • Traffic Statistics
  • Last Seen Timestamps

ARP Spoofing

To monitor traffic from a specific target:

set arp.spoof.targets 192.168.88.138
arp.spoof on

DNS Spoofing

To redirect traffic for specific domains to your machine:

set dns.spoof.domains google.com
dns.spoof on

Remember to use these tools responsibly and only on networks you own or have permission to test.