State of arp poisoning using FreeBSD

I am trying to compile bettercap like many others and not succeeding. The website promises support and asks the visitor to head to the Releases section at GitHub but they have binaries for everything but FreeBSD.
ettercap works but bettercap has more recent usable additions.

I am interested in knowing if you all - the FreeBSD community at large uses for arp MITM and what they are using to decipher traffic post arp redirection.
I know dsniff has arpspoof and there are many other simple utilities to do that, but I am interested in sslstrip and downgrade/tampering of data being served over other protocols. Mere passing of encryted traffic won't help much. Any luck using bettercap on FreeBSD or any other recommended options?
 
"BetterCap is responsible for giving the security researcher everything he needs in one single tool which simply works, on GNU/Linux, Mac OS X and OpenBSD systems."

Looks like FreeBSD is not officially supported. I'm sure with a good bit of effort you can get it working. If you do you could post your steps to help other security researches in the future. ?

Source: https://www.bettercap.org/legacy/
 
I would be genuinely surprised if bettercap compiled as is on OpenBSD.. Heck, there aren't even any compiled binaries for OpenBSD. It's a lie!
A lot of people, including me have attempted to do more than just good bit of effort.. Same goes for responder.. which finally one can manage to run but get no 'responses' :D
Scapy does not run perfectly as it should. FreeBSD used to be penetration test friendly once upon a time.
 
Back
Top