Poison DNS
Complete this lab as follows:
- Use Ettercap to begin sniffing and scanning for hosts as follows:
- From the Favorites bar, open Ettercap.
- Select Sniff.
- Select Unified sniffing.
- From the Network Interface drop-down list, select enp2s0.
- Select OK.
- Select Hosts and select Scan for hosts.
- Set Exec (192.168.0.30) as the target machine as follows:
- Select Hosts and select Host list.
- Under IP Address, select 192.168.0.30.
- Select Add to Target 1 to assign it as the target.
- Initiate DNS spoofing as follows:
- Select Plugins.
- Select Manage the plugins.
- Select the Plugins tab.
- Double-click dns_spoof to activate it.
- Select Mitm.
- Select ARP poisoning.
- Select Sniff remote connections.
- Select OK.
- From Exec, access rmksupplies.com as follows:
- From the top navigation tabs, select Floor 1 Overview.
- Under Executive Office, select Exec.
- From the task bar, open Chrome.
- In the URL field, type rmksupplies.com and press Enter.
Notice that the page was redirected to RUS Office Supplies despite the web address not changing.
Comments
Post a Comment