DNS SPOOFING ATTACK USING ETTERCAP (2022) | BePractical

Поделиться
HTML-код
  • Опубликовано: 10 июн 2022
  • Hi everyone, This video is a demonstration of conducting a successful DNS SPOOFING ATTACK.
    A DNS SPOOFING is a kind of mitm attack in which the attacker forge the dns to their controlled IP address to serve malicious content.
  • НаукаНаука

Комментарии • 45

  • @benokami3859
    @benokami3859 Год назад +1

    Thank you very much chief, this was very helpful. Much appreciation.

  • @bloodbound696
    @bloodbound696 2 года назад +1

    Hey man, just wanted to say I loved the video, clear good tutorial. Congrats. Keep videos like this going please this was amazing. This may be a challenge for you, including myself as I am also researching this, but could you create a tutorial for Frag-Attacks?

  • @oliverpower7155
    @oliverpower7155 10 месяцев назад +1

    This was amazing, thank you

  • @aihkww
    @aihkww Год назад +4

    This tutorial is brilliant

  • @charlesecheverria1870
    @charlesecheverria1870 Год назад

    La buena mi pai
    saludos desde coveñas

  • @TheBigSweetah
    @TheBigSweetah 8 дней назад

    Hello! Excuse me, I want to do this attack on a local network with my virtual machines for a Pentesting homework. But i can’t make it work :(, it’s because I don’t have a gateway? I have a Kali Linux (attacker) hosting a false website, Windows Server 2016 with Xampp hosting the true website and a Windows 10 client. I followed the steps exactly as the video, but I can still connect to the true website with both windows machines. I would be very thankful if you could help me out, thank you in advance!
    Note: The DNS set for both Windows Machines is not Google, it’s the WS2016 IP, as it’s an Active Directory providing DNS too. Also, the real website works under HTTPS by an auto signed SSL certificate, operating in the whole Active Directory

  • @MsSam676
    @MsSam676 Год назад

    thank you

  • @ggelosstavrou9117
    @ggelosstavrou9117 3 месяца назад +4

    It doesn’t work for me… it doesn’t redirect the browser to my local host … it just lands to the original page …

  • @ddosmukhambetov
    @ddosmukhambetov 6 месяцев назад

    thank you dude

  • @marshalldteach1109
    @marshalldteach1109 Год назад +1

    Hello brother, thank you for this content. But I have a question, does this only works when the attacker and the victim is in the same network?

  • @ItssStarzy
    @ItssStarzy 8 месяцев назад

    ESPERO QUE PARA LA PROXIMA ME LO HAGAS EN ESPAÑOL THX

  • @digitaltechnical2691
    @digitaltechnical2691 8 месяцев назад

    Shenanigans ❤

  • @theonlyreason9040
    @theonlyreason9040 Год назад +1

    bro has experience

  • @jpek6198
    @jpek6198 Год назад +1

    When i write localhost on the browser i see "unable to connect"
    Of course i got service apache2 started
    Why it's not working?

  • @sitrakarakotondramanana4457
    @sitrakarakotondramanana4457 Год назад

    Did you think it's possible to run attack on non incognito mode broswer? Did you think this attack run with https?

    • @Yazen.hamdan9
      @Yazen.hamdan9 Год назад

      @@BePracticalTech i added the sslstrip as a plugin but it's not working .. is there smth i missed ?
      can u explain in brief how to do it here ?

    • @Yazen.hamdan9
      @Yazen.hamdan9 Год назад

      @@BePracticalTech Thx man

  • @habibrommeni
    @habibrommeni Месяц назад

    it works forall the users in the net right ? , not only the local host iof your own pc

    • @BePracticalTech
      @BePracticalTech  Месяц назад

      It works for every device connected to your local network

  • @ritikmishra5412
    @ritikmishra5412 24 дня назад

    Make tutorial on dns spoofing others network not on the same network

  • @ginasubrata8489
    @ginasubrata8489 Год назад

    how about practice in real web .. i mean .. this is MITM right? so only host at list will be affected ..
    how about make it affected to all client acces thats site?

    • @ginasubrata8489
      @ginasubrata8489 Год назад

      @@BePracticalTech script? which one script u mean? thats site is redirecting to your local right but not everyone will redirect there .. only device who connect to your local network will be redirect .

    • @kerr6897
      @kerr6897 8 месяцев назад +1

      Dude are how do you want to redirect pc's you odnt have control on ? that can only happen if you hack the dns server of google or cloudflare

    • @shadowit4048
      @shadowit4048 4 месяца назад

      @@kerr6897 yep or compromise their domain registration account

  • @wayneelorde2115
    @wayneelorde2115 Год назад

    Do this work on wlan? Or only ethernet

    • @JRDP_Team
      @JRDP_Team 4 месяца назад

      Works on wlan too

  • @MR.MARIO_DEV
    @MR.MARIO_DEV Год назад +1

    The phones can be attacked ?

    • @MR.MARIO_DEV
      @MR.MARIO_DEV Год назад +1

      @@BePracticalTech can you explain me why we have to use anonymous browsing ?

    • @BendaCZ
      @BendaCZ Год назад

      @@MR.MARIO_DEV he wanted to show, that the "hacked" website was not in his cache ig

  • @hokitoken878
    @hokitoken878 7 месяцев назад

    Work just for local area?

  • @jo-qi6ie
    @jo-qi6ie Год назад +1

    Brother, we want an explanation necessary to hack the router’s admin page and know the user and password

  • @charlesecheverria1870
    @charlesecheverria1870 Год назад

    oeeeee melo ese video

  • @charlesecheverria1870
    @charlesecheverria1870 Год назад

    Junior tu papá, los demás valen mondá

  • @segoroff4068
    @segoroff4068 Год назад +1

    Your do this attack because all the browser say you (your connection is not private)

    • @segoroff4068
      @segoroff4068 Год назад

      @@BePracticalTech ok thank you so much

    • @shilpajossy
      @shilpajossy Год назад

      How to use SSL strip to bypass https

  • @yadav-satyam
    @yadav-satyam 10 месяцев назад

    Frankly saying, u taught like an INDIAN EDUCATION SYSTEM, just said - "do this then do that..." U have to give the explanation too bro,so that we get the reason why we have to do that..., otherwise same thing "Red python Cybersecurity " channel taught...