DNS SPOOFING ATTACK USING ETTERCAP (2022) | BePractical

preview_player
Показать описание
Hi everyone, This video is a demonstration of conducting a successful DNS SPOOFING ATTACK.
A DNS SPOOFING is a kind of mitm attack in which the attacker forge the dns to their controlled IP address to serve malicious content.
Рекомендации по теме
Комментарии
Автор

It doesn’t work for me… it doesn’t redirect the browser to my local host … it just lands to the original page …

ggelosstavrou
Автор

Thank you very much chief, this was very helpful. Much appreciation.

benokami
Автор

Hey man, just wanted to say I loved the video, clear good tutorial. Congrats. Keep videos like this going please this was amazing. This may be a challenge for you, including myself as I am also researching this, but could you create a tutorial for Frag-Attacks?

bloodbound
Автор

Hello! Excuse me, I want to do this attack on a local network with my virtual machines for a Pentesting homework. But i can’t make it work :(, it’s because I don’t have a gateway? I have a Kali Linux (attacker) hosting a false website, Windows Server 2016 with Xampp hosting the true website and a Windows 10 client. I followed the steps exactly as the video, but I can still connect to the true website with both windows machines. I would be very thankful if you could help me out, thank you in advance!

Note: The DNS set for both Windows Machines is not Google, it’s the WS2016 IP, as it’s an Active Directory providing DNS too. Also, the real website works under HTTPS by an auto signed SSL certificate, operating in the whole Active Directory

TheBigSweetah
Автор

Hello brother, thank you for this content. But I have a question, does this only works when the attacker and the victim is in the same network?

marshalldteach
Автор

When i write localhost on the browser i see "unable to connect"
Of course i got service apache2 started
Why it's not working?

jpek
Автор

it works forall the users in the net right ?, not only the local host iof your own pc

habibrommeni
Автор

La buena mi pai

saludos desde coveñas

charlesecheverria
Автор

how about practice in real web .. i mean .. this is MITM right? so only host at list will be affected ..

how about make it affected to all client acces thats site?

ginasubrata
Автор

Make tutorial on dns spoofing others network not on the same network

ritikmishra
Автор

Did you think it's possible to run attack on non incognito mode broswer? Did you think this attack run with https?

sitrakarakotondramanana
Автор

Brother, we want an explanation necessary to hack the router’s admin page and know the user and password

jo-qiie
Автор

ESPERO QUE PARA LA PROXIMA ME LO HAGAS EN ESPAÑOL THX

ItssStarzy
Автор

Do this work on wlan? Or only ethernet

wayneelorde
Автор

Your do this attack because all the browser say you (your connection is not private)

TechInformations
Автор

Junior tu papá, los demás valen mondá

charlesecheverria
Автор

Frankly saying, u taught like an INDIAN EDUCATION SYSTEM, just said - "do this then do that..." U have to give the explanation too bro, so that we get the reason why we have to do that..., otherwise same thing "Red python Cybersecurity " channel taught...

yadav-satyam