Skip to content

DNSSpoof in under 2 minutes in Kali/ParrotOS | QUICK TUTORIALS | HOXFRAMEWORK

Posted in VIDEOS

Thank you so much for visiting!
Today we are explaining DNS Spoof quickly and keeping it simple.
PLEASE DO NOT USE THIS ILLEGALY. THIS IS JUST A DEMONSTRATION -MEANT FOR LEARNING.

Boot up your machine and let’s start:

sudo nano /etc/ettercap/etter.dns
-this is the file we modify to tell dnsspoof what to redirect to and where from.
-here you can change the custom websites to redir to your IP, (under microsoft sucks part)
-or you can scroll all the way down and write:
..* A
-check your ip with : ifconfig

-Now lets start up our server and modify our html file:
service apache2 start
cd /var/www/html
sudo rm index.*
-make a new index.html file
sudo nano index.html
-write whatever you want inside
-save, next you can modify the etter.conf but for me it worked even without modifying
-but lets do it anyway
sudo nano /etc/ettercap/etter.dns
-under ec_uid and ec_gid write 0 instead of 65534
-slide all the way down to the linux part and uncomment under Iptables:
redir_command_on and redir_command_off
-Now start your ettercap:
sudo ettercap -G
-go to sniff – united sniffing – select your interface – ok
-hosts- host list, enable ipv6 if you want to i do that often, scan for hosts
-select all hosts and add them to target 2 (or by official documentation add router to target2 and others to target1)
-Mitm> Arp Poison-Sniff remote connections
-Plugins>manage plugins> dnsspoof (doubleclick it)

And there you go !!!

Thank you so much for visiting and have a nice day.