10.1.10 Poison DNS
In this lab, your task is to:
Use Ettercap to begin sniffing and scanning for hosts.
Set Exec (192.168.0.30) as the target machine
Initiate DNS spoofing.
From Exec, access rmksupplies.com.
Steps:
1. Use Ettercap to begin sniffing/scanning for hosts
a. Open Ettercap
b. Select Sniff
c. Select Unified Sniffing
d. Select enp2s0 from Network Interface & click Ok
e. Select Hosts and select Scan for hosts
2. Set Exec (192.168.0.30) as target
a. Select Hosts and select Host list
b. Under IP select 192.168.0.30
c. Select Add to Target 1 3. Initiate DNS spoofing
a. Select Plugins
b. Select Manage the Plugins
c. Select the Plugins tab
d. Double click dns_spoof to activate
e. Select Mitm, then select ARP poisoning, then Sniff remote connections, OK
4. From Exec access rmksupplies.com
a. Select Exec
b. Open Chrome
c. Type rmksupplies.com
- changes to RUS Office supplies