DNS spoofing and ARP spoofing
In this recipe, we will discuss how to perform DNS and ARP spoofing. In several of our past recipes, we have shown website attacks that utilize an IP address for the attack—the IP of the Kali machine. However, in real attacks, this may easily be spotted. The whole point of the attack is to make it appear as if they are going to the proper site and making it appear as real as possible. The first part of this process is to perform DNS spoofing.
Getting ready
Let's ensure the following prerequisites:
- Kali Linux is running, and you are logged in as root
- Move the interface from one of your Windows test machines to the NAT network temporarily
How to do it...
We will now use ARP spoofing to redirect a user to a fake website:
- Open up a new terminal window by clicking on the following icon.
- We need to ensure promiscuous mode is on for the interface we are using, and we all need to ensure that IP forwarding is turned on. We need to create a host file to spoof a particular site...