Preface: I had an argument with a buddy the other day, he said it was impossible I disagreed. So say I have a large network of computers all visiting the same website for some reason. Then I have a DNS redirect from login.php (The original site). I will supply a fake login page from my own apache server (fake.php). Is there a way to stop the spoof or redirect in a way that it wont be intercepted and spoofed again when a user logs in?
So the user goes to login.php
User is redirected to fake.php
Types in fake credentials
***Redirects to login.php to login for real this time.
***End spoofing for that specific IP, or redirect in a way where the user wont be spoofed again.
The only problem is if I do redirect to login.php after a login it will be spoofed again! Is there any way to stop this? I thought about not using UDP port 53 (Which is what MITMF's DNS plug in uses). But how can I redirect then? Direct GET/POST data and print the output externally?
I am using MITMF with arp and dns spoof. Any Ideas?