Cyber Research Wiki

Bettercap

An extensible, cross‑platform network attack and reconnaissance framework for 802.11 Wi‑Fi, Ethernet/IPv4/IPv6, BLE, HID, and CAN‑bus, featuring MITM components, sniffing, spoofing, and scriptable automation via caplets.

Overview

Bettercap is a general‑purpose, interactive offensive‑security framework for local network and wireless assessment. It consolidates reconnaissance and active manipulation across Ethernet/IP and multiple radio technologies, exposing modules for Wi‑Fi scanning and interference, LAN man‑in‑the‑middle (MITM) via spoofing, packet sniffing and application‑layer interception, as well as discovery and interaction with BLE, HID, and CAN‑bus environments. Operation is orchestrated from an interactive console or automated through caplets and a REST/web interface. Its design makes it a common choice for red‑team exercises, wireless security testing, and controlled laboratory research; it is not intended for bandwidth management or traffic shaping.

What It Is

Bettercap is a Go‑based, portable framework that aggregates passive discovery and active attack primitives under a modular architecture. Modules cover Wi‑Fi (reconnaissance, deauthentication, handshake/PMKID capture, rogue beacon injection), Ethernet/IP MITM (ARP, DNS, NDP, DHCPv6 spoofing), packet capture and filtering, HTTP/HTTPS proxying, and peripheral/radio domains such as BLE, HID, and CAN. A script system (“caplets”) enables multi‑stage compositions of these capabilities, and a REST/web UI provides external control and telemetry. The tool’s scope spans reconnaissance, credential exposure on insecure protocols, and adversary emulation on local networks within authorized testing boundaries.

How It Works

At a systems level, Bettercap binds to a chosen network interface and loads protocol‑specific modules that operate at link, network, and application layers. On Wi‑Fi, compatible NICs are placed in monitor mode to channel‑hop, enumerate access points and clients, perform targeted deauthentication, capture WPA/WPA2/WPA3 handshakes and PMKIDs, and inject management beacons to simulate rogue access points. On wired and IPv6‑enabled networks, spoofing modules (ARP, DNS, NDP, DHCPv6) establish traffic redirection for MITM observation or manipulation. A sniffer provides packet capture with filtering and limited fuzzing, while HTTP/HTTPS proxies expose hooks for traffic inspection or modification, constrained by modern protections such as HSTS and HTTPS‑first policies. Caplets coordinate sequencing and state across modules and proxies, and the REST API/web UI expose events, metrics, and control surfaces for integration and monitoring.

Core Concepts

Typical Workflow

Use Cases

Limitations

Related Tools

Evidence Gaps

Sources

Confidence

high