How to DNS Spoof (Kali Linux 2.0)



G2A Re-link: https://www.g2a.com/?reflink=jackk1337

In this tutorial jackktutorials shows you perform a DNS Spoof attack on Kali Linux 2.0 using Ettercap 0.8.2

LINKS AND RESOURCES
*************************

Written Guide – http://jackktutorials.com/forums/showthread.php?tid=1319

GET MORE JACKKTUTORIALS!
********************************

Website: http://www.jackktutorials.com
Forums: http://www.jackktutorials.com/forums
Facebook: http://www.facebook.com/jackktutorials
Twitter: http://www.twitter.com/jackktutorials
Email: [email protected]
Business Contact: [email protected]
G2A Re-link: https://www.g2a.com/?reflink=jackk1337

source

Mourad ELGORMA

Mourad ELGORMA

Fondateur de summarynetworks, passionné des nouvelles technologies et des métiers de Réseautique , Master en réseaux et système de télécommunications. ,j’ai affaire à Pascal, Delphi, Java, MATLAB, php …Connaissance du protocole TCP / IP, des applications Ethernet, des WLAN …Planification, installation et dépannage de problèmes de réseau informatique……Installez, configurez et dépannez les périphériques Cisco IOS. Surveillez les performances du réseau et isolez les défaillances du réseau. VLANs, protocoles de routage (RIPv2, EIGRP, OSPF.)…..Manipuler des systèmes embarqués (matériel et logiciel ex: Beaglebone Black)…Linux (Ubuntu, kali, serveur Mandriva Fedora, …). Microsoft (Windows, Windows Server 2003). ……Paquet tracer, GNS3, VMware Workstation, Virtual Box, Filezilla (client / serveur), EasyPhp, serveur Wamp,Le système de gestion WORDPRESS………Installation des caméras de surveillance ( technologie hikvision DVR………..). ,

31 réflexions sur “How to DNS Spoof (Kali Linux 2.0)

  • Avatar
    mai 19, 2020 à 10:31
    Permalien

    thank you men! i wan to use gameover2 to redirect victims pc to my webpage payload with hta file that can bypass any anti virus now. but it seems no one knows how to installed it except the man who created the video on youtube using hta file by bypassing all updated antivirus.. so i used your tutorial and it gives me the idea to use dns spoof attack to redirect the victims pc using apache2 web server to download my payload on the page and the metasploit as backdoor..

    Répondre
  • Avatar
    mai 19, 2020 à 10:31
    Permalien

    What if I want to spoof the whole LAN instead of just 1 device on the LAN ?

    Répondre
  • Avatar
    mai 19, 2020 à 10:31
    Permalien

    hey my postforward on target 1 but still doesn't allow the target device to access the internet, help me please

    Répondre
  • Avatar
    mai 19, 2020 à 10:31
    Permalien

    Hey, I like the way you're presenting things on YouTube. Please get back to me on IRC FreeNode #ettercap-project. There''s a really cool feature coming up I'd like you could present. Would be great. Thanks.

    Répondre
  • Avatar
    mai 19, 2020 à 10:31
    Permalien

    ok i have done some tests and need your help , i did arp spoofing , and i changed the etter.dns to redirect client to my Kali machine & then i did Dns Spoofing and it Worked Great and redirected the client succssfully , the only problem that the client disconnects from the internet , Is it anyway to Dns spoof the target without make him lose his Internet connection please Contact me back ASAP

    Répondre
  • Avatar
    mai 19, 2020 à 10:31
    Permalien

    It does not work for me, i did everything right it should be working but facebook is going to right link

    Répondre
  • Avatar
    mai 19, 2020 à 10:31
    Permalien

    can someone help ?? after starting sniffing the network overall devices stop working and do not get redirected to localhost

    Répondre
  • Avatar
    mai 19, 2020 à 10:31
    Permalien

    It's shows error when dns spoof start sniffing like this
    ERR_SSL_VERSION_OR_CIPHER_MISMATCH

    Répondre
  • Avatar
    mai 19, 2020 à 10:31
    Permalien

    thanks man you're really good at explaining stuff thanks keep it up !

    Répondre
  • Avatar
    mai 19, 2020 à 10:31
    Permalien

    I did alternative way without using kali. The procedure is on windows system hosts edited with 127.0.0.1 example.com then installed xampp. if I type in example.com I get to see my localhost xampp server. How is it any different from your method? Is it same? Also I was trying to analyze the malware however its ignoring my hosts file. Why is that?

    Répondre
  • Avatar
    mai 19, 2020 à 10:31
    Permalien

    hey this isn't working. Any idea why?
    Ive done everything in the video except edit the html file (I left it default.)
    Does this still work in 2020?
    Doing it on an iphone btw. I've tried with and without ip forwarding;.

    Répondre

Laisser un commentaire