Let's get started. Here, we will conduct an ARP poisoning attack against the victim, and spoof the DNS queries. Therefore, if the victim tries to open a standard website, such as http://google.com, which is most commonly browsed to, they will get the browser autopwn service in return, which will result in their system getting attacked by the browser autopwn server.
We will first create a list of entries for poisoning the DNS, so that whenever a victim tries to open a domain, the name of the domain points to the IP address of our browser autopwn service, instead of http://www.google.com. The spoofed entries for the DNS reside in the following file:
In this example, we will use one of the most popular sets ...