The output is:
Listening on:
en2 -> ***** (My MAC)
192.168.2.146/255.255.255.0
*****
Privileges dropped to UID 65534 GID 65534...
33 plugins
40 protocol dissectors
54 ports monitored
16074 mac vendor fingerprint
1766 tcp OS fingerprint
2182 known services
Randomizing 255 hosts for scanning...
Scanning the whole netmask for 255 hosts...
7 hosts added to the hosts list...
Host 192.168.2.1 added to TARGET1
Host 192.168.2.128 added to TARGET2
ARP poisoning victims:
GROUP 1 : 192.168.2.1 **** (MAC Router)
GROUP 2 : 192.168.2.128 (MAC victim)
Starting Unified sniffing...
DHCP: [192.168.2.1] ACK : 192.168.2.150 255.255.255.0 GW 192.168.2.1 DNS 192.168.2.1 "speedport.ip"
I don't think this will be very helpful :(
My terminal that is attached to ettercap shows
ettercap 0.8.0 copyright 2001-2013 Ettercap Development Team
01000 fwd 127.0.0.1,59272 ip from any to any proto tcp dst-port 992 in via en2
01100 fwd 127.0.0.1,59273 tcp from any to any dst-port 465 in via en2
01200 fwd 127.0.0.1,59274 ip from any to any proto tcp dst-port 995 in via en2
01300 fwd 127.0.0.1,59275 ip from any to any proto tcp dst-port 563 in via en2
01400 fwd 127.0.0.1,59276 tcp from any to any dst-port 636 in via en2
01500 fwd 127.0.0.1,59277 tcp from any to any dst-port 994 in via en2
01600 fwd 127.0.0.1,59278 tcp from any to any dst-port 993 in via en2
01700 fwd 127.0.0.1,59279 tcp from any to any dst-port 8080 in via en2
01800 fwd 127.0.0.1,59280 tcp from any to any dst-port 443 in via en2