Dnsspoof
From charlesreid1
DNS spoofing with Dnsspoof
Dnsspoof works in a very similar way to the Bettercap#DNS Spoofing attack. It hijacks the sheep's DNS requests and pretends to be the gateway. In fact, it scans the sheep's DNS traffic. The DNS spoofing configuration file specifies things like, "redirect traffic to microsoft.com to 192.168.0.4", where there is a fake version of microsoft.com. Etc.
To run dnsspoof, you specify a network interface and a configuration file. These are the same format as the Bettercap#DNS Spoofing attack configuration file.
$ dnsspoof -i wlan1 -f extrabacon.conf
Flag
monkey in the middle attacks in which an attacker tricks two parties into thinking they're communicating with each other, but both are communicating with the attacker.
Wireless Attacks: MITM/Wireless Wired Attacks: MITM/Wired
Layer 1 and 2 MITM Attacks: Network Tap: MITM/Wired/Network Tap Evil Twin Attack: Evil Twin · MITM/Evil Twin
Layer 3 and 4 MITM Attacks:
ARP Poisoning: MITM/ARP Poisoning Traffic Injection/Modification: MITM/Traffic Injection DNS Attacks: MITM/DNS · Bettercap/Failed DNS Spoofing Attack · Bettercap/Failed DNS Spoofing Attack 2 DHCP Attacks: MITM/DHCP WPAD MITM Attack: MITM/WPAD Port Stealing: MITM/Port Stealing Rushing Attack: MITM/Rushing Attack Attacking HTTPS: MITM/HTTPS
Session Hijacking: MITM/Session Hijacking
Toolz:
SSLSniff · SSLStrip · Frankencert
MITM Labs: {{MITMLabs}}
Category:MITM · Category:Attacks · Category:Kali Attack Layers Template:MITMLabs · Template:MITMFlag Flags · Template:MITMFlag · e |