Poison DNS

 Complete this lab as follows:

  1. Use Ettercap to begin sniffing and scanning for hosts as follows:
    1. From the Favorites bar, open Ettercap.
    2. Select Sniff.
    3. Select Unified sniffing.
    4. From the Network Interface drop-down list, select enp2s0.
    5. Select OK.
    6. Select Hosts and select Scan for hosts.
  2. Set Exec (192.168.0.30) as the target machine as follows:
    1. Select Hosts and select Host list.
    2. Under IP Address, select 192.168.0.30.
    3. Select Add to Target 1 to assign it as the target.
  3. Initiate DNS spoofing as follows:
    1. Select Plugins.
    2. Select Manage the plugins.
    3. Select the Plugins tab.
    4. Double-click dns_spoof to activate it.
    5. Select Mitm.
    6. Select ARP poisoning.
    7. Select Sniff remote connections.
    8. Select OK.
  4. From Exec, access rmksupplies.com as follows:
    1. From the top navigation tabs, select Floor 1 Overview.
    2. Under Executive Office, select Exec.
    3. From the task bar, open Chrome.
    4. In the URL field, type rmksupplies.com and press Enter.
      Notice that the page was redirected to RUS Office Supplies despite the web address not changing.


Comments

Popular Posts