DNS SPOOFING ATTACK USING ETTERCAP (2022) | BePractical
HTML-код
- Опубликовано: 10 июн 2022
- Hi everyone, This video is a demonstration of conducting a successful DNS SPOOFING ATTACK.
A DNS SPOOFING is a kind of mitm attack in which the attacker forge the dns to their controlled IP address to serve malicious content. - Наука
Thank you very much chief, this was very helpful. Much appreciation.
Hey man, just wanted to say I loved the video, clear good tutorial. Congrats. Keep videos like this going please this was amazing. This may be a challenge for you, including myself as I am also researching this, but could you create a tutorial for Frag-Attacks?
This was amazing, thank you
This tutorial is brilliant
La buena mi pai
saludos desde coveñas
Hello! Excuse me, I want to do this attack on a local network with my virtual machines for a Pentesting homework. But i can’t make it work :(, it’s because I don’t have a gateway? I have a Kali Linux (attacker) hosting a false website, Windows Server 2016 with Xampp hosting the true website and a Windows 10 client. I followed the steps exactly as the video, but I can still connect to the true website with both windows machines. I would be very thankful if you could help me out, thank you in advance!
Note: The DNS set for both Windows Machines is not Google, it’s the WS2016 IP, as it’s an Active Directory providing DNS too. Also, the real website works under HTTPS by an auto signed SSL certificate, operating in the whole Active Directory
thank you
It doesn’t work for me… it doesn’t redirect the browser to my local host … it just lands to the original page …
same bro😔🤐
thank you dude
Hello brother, thank you for this content. But I have a question, does this only works when the attacker and the victim is in the same network?
yep
ESPERO QUE PARA LA PROXIMA ME LO HAGAS EN ESPAÑOL THX
Shenanigans ❤
bro has experience
When i write localhost on the browser i see "unable to connect"
Of course i got service apache2 started
Why it's not working?
Did you think it's possible to run attack on non incognito mode broswer? Did you think this attack run with https?
@@BePracticalTech i added the sslstrip as a plugin but it's not working .. is there smth i missed ?
can u explain in brief how to do it here ?
@@BePracticalTech Thx man
it works forall the users in the net right ? , not only the local host iof your own pc
It works for every device connected to your local network
Make tutorial on dns spoofing others network not on the same network
how about practice in real web .. i mean .. this is MITM right? so only host at list will be affected ..
how about make it affected to all client acces thats site?
@@BePracticalTech script? which one script u mean? thats site is redirecting to your local right but not everyone will redirect there .. only device who connect to your local network will be redirect .
Dude are how do you want to redirect pc's you odnt have control on ? that can only happen if you hack the dns server of google or cloudflare
@@kerr6897 yep or compromise their domain registration account
Do this work on wlan? Or only ethernet
Works on wlan too
The phones can be attacked ?
@@BePracticalTech can you explain me why we have to use anonymous browsing ?
@@MR.MARIO_DEV he wanted to show, that the "hacked" website was not in his cache ig
Work just for local area?
Yes
Brother, we want an explanation necessary to hack the router’s admin page and know the user and password
Maybe we shouldn't, though.
oeeeee melo ese video
Junior tu papá, los demás valen mondá
Your do this attack because all the browser say you (your connection is not private)
@@BePracticalTech ok thank you so much
How to use SSL strip to bypass https
Frankly saying, u taught like an INDIAN EDUCATION SYSTEM, just said - "do this then do that..." U have to give the explanation too bro,so that we get the reason why we have to do that..., otherwise same thing "Red python Cybersecurity " channel taught...