当前位置:网站首页>DNS hijacking
DNS hijacking
2022-07-04 10:36:00 【I·CE】
Are simulated locally , Please do not use it in illegal ways
Xiaobai studies , If there are any errors or suggestions, please put forward
So let's see dns agreement , Of course dns It can also be used as a hidden tunnel ,,, Write it later
DNS The protocol is used to convert domain names to IP Address ( Can also be IP Convert the address to the corresponding domain name address )
dns hijacked :
Experimental environment :
Windows10( Drone aircraft ) 192.168.64.139,kali Linux( attack ) 192.168.64.133
Are all NAT Pattern , Ensure that they are in the same gateway , Be able to communicate , It can be used ping test (windows Default ping The four time ,Linux Default always ping, You can add a parameter -c To specify the ping The number of times )
Get ready :
The tools used are kali Under the ettercap, Need to be in ettercap.dns Add the following data to the file ( stay /etc/ettercap/ettercap.dns in ):
###################################################
#microsoft sucks
#redirect it to www.linux.org
microsoft.com A 107.170.40.56
*.microsoft.com A 107.170.40.56
www.microsoft.com PTR 107.170.40.56 # wildcards in PTR are not allowed
*A 192.168.64.133
*PTR 192.168.64.133
##################################################
ps: Below * Represents all parsed to the target IP
Start
open ettercap, Choose the network card eth0
hosts Choose from scan for hosts Scan host , then hosts list List the surviving hosts
Take the attack IP Add to target1, Join the gateway target2
choice ARP poisoning… that , Default ,ok, Where to find out for yourself , Different versions and positions
stay plugins choice manage plugins, choice dns_spoof
Then it began to attack
then ping Baidu will find that the analysis is kali Of ip
Little knowledge : If a website suddenly cannot be accessed, it may be that the operator hijacked your dns, Try modifying it locally hosts file
Usage expansion , Inside net fishing :
msf Create a Trojan , Let the target resolve to the server you set up , Build a website on the server , Prompt to download and upgrade the browser plug-in , Induced download generated Trojan
service apache2 start // start-up apache The server , Remember to drive 80 port
cp test.exe /var/www/html // Put the Trojan under the page
Limited ability , The page of inducing downloading and upgrading browser plug-ins cannot be written ,,, No code found , Subsequent patch ,,,
边栏推荐
- Rhcsa operation
- Dynamic memory management
- Uniapp--- initial use of websocket (long link implementation)
- Safety reinforcement learning based on linear function approximation safe RL with linear function approximation translation 2
- Recursive method to achieve full permutation (C language)
- 20 minutes to learn what XML is_ XML learning notes_ What is an XML file_ Basic grammatical rules_ How to parse
- Software sharing: the best PDF document conversion tool and PDF Suite Enterprise version sharing | with sharing
- From programmers to large-scale distributed architects, where are you (I)
- Number of relationship models
- Student achievement management system (C language)
猜你喜欢
Doris / Clickhouse / Hudi, a phased summary in June
Introduction to tree and binary tree
Latex error: missing delimiter (. Inserted) {\xi \left( {p,{p_q}} \right)} \right|}}
Huge number (C language)
If you don't know these four caching modes, dare you say you understand caching?
Rhcsa learning practice
C language structure to realize simple address book
Safety reinforcement learning based on linear function approximation safe RL with linear function approximation translation 1
Introduction to extensible system architecture
183 sets of free resume templates to help everyone find a good job
随机推荐
If you don't know these four caching modes, dare you say you understand caching?
[Galaxy Kirin V10] [desktop] cannot add printer
If the uniapp is less than 1000, it will be displayed according to the original number. If the number exceeds 1000, it will be converted into 10w+ 1.3k+ display
RHCE day 3
Service developers publish services based on EDAs
Button wizard business running learning - commodity quantity, price reminder, judgment Backpack
Rhsca day 11 operation
Differences among opencv versions
What is devsecops? Definitions, processes, frameworks and best practices for 2022
Linked list operation can never change without its roots
有老师知道 继承RichSourceFunction自定义读mysql怎么做增量吗?
Add t more space to your computer (no need to add hard disk)
uniapp---初步使用websocket(长链接实现)
When I forget how to write SQL, I
Four characteristics and isolation levels of database transactions
Does any teacher know how to inherit richsourcefunction custom reading Mysql to do increment?
Student achievement management system (C language)
Es advanced series - 1 JVM memory allocation
Occasional pit compiled by idea
Error C4996 ‘WSAAsyncSelect‘: Use WSAEventSelect() instead or define _ WINSOCK_ DEPRECATED_ NO_ WARN