![]() Go to “microsoft sucks” and add line # Add redirection for to other site (172.217.11.46) Ping Edit Ettercap DNS configuration file (take a copy first) cp /etc/Ettercap/etter.dns /etc/Ettercap/ Obtain ip addresses of websites (source and destination) ping Use (website for testing, like a target). sudo apt install xplico Command line, intercept everything on the network (spoof ARP table) # Can be run before using WiresharkĮttercap -T -M arp:remote // DNS Spoofing AttackĭNS: Domain Name Services, transfers from name to IP (networks only using IPs). Xplico: forensic tool under kali menu “Forensics”, might need to download & install. Open a browser Show router table, MAC should change (victim thinks kali is the router) arp -a Analyze the traffic and reassemble packets Under Mitmm choose ARP Poisonning, and check Sniff remote connection.Any traffic going between the router (target 1) and victim (target 2) will be going through the kali linux machine.Select the victim, click on Add to Target 2.Select the gateway, click on Add to Target 1. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |