Tricking victims with DNS hijacking

Let's get started. Here, we will conduct an ARP poisoning attack against the victim, and spoof the DNS queries. Therefore, if the victim tries to open a standard website, such as http://google.com, which is most commonly browsed to, they will get the browser autopwn service in return, which will result in their system getting attacked by the browser autopwn server.

We will first create a list of entries for poisoning the DNS, so that whenever a victim tries to open a domain, the name of the domain points to the IP address of our browser autopwn service, instead of http://www.google.com. The spoofed entries for the DNS reside in the following file:

In this example, we will use one of the most popular sets ...

Get The Complete Metasploit Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.