当前位置:网站首页>DNS hijacking
DNS hijacking
2022-07-04 10:36:00 【I·CE】
Are simulated locally , Please do not use it in illegal ways
Xiaobai studies , If there are any errors or suggestions, please put forward
So let's see dns agreement , Of course dns It can also be used as a hidden tunnel ,,, Write it later
DNS The protocol is used to convert domain names to IP Address ( Can also be IP Convert the address to the corresponding domain name address )
dns hijacked :
Experimental environment :
Windows10( Drone aircraft ) 192.168.64.139,kali Linux( attack ) 192.168.64.133
Are all NAT Pattern , Ensure that they are in the same gateway , Be able to communicate , It can be used ping test (windows Default ping The four time ,Linux Default always ping, You can add a parameter -c To specify the ping The number of times )
Get ready :
The tools used are kali Under the ettercap, Need to be in ettercap.dns Add the following data to the file ( stay /etc/ettercap/ettercap.dns in ):
###################################################
#microsoft sucks
#redirect it to www.linux.org
microsoft.com A 107.170.40.56
*.microsoft.com A 107.170.40.56
www.microsoft.com PTR 107.170.40.56 # wildcards in PTR are not allowed
*A 192.168.64.133
*PTR 192.168.64.133
##################################################
ps: Below * Represents all parsed to the target IP
Start
open ettercap, Choose the network card eth0
hosts Choose from scan for hosts Scan host , then hosts list List the surviving hosts
Take the attack IP Add to target1, Join the gateway target2
choice ARP poisoning… that , Default ,ok, Where to find out for yourself , Different versions and positions
stay plugins choice manage plugins, choice dns_spoof
Then it began to attack
then ping Baidu will find that the analysis is kali Of ip
Little knowledge : If a website suddenly cannot be accessed, it may be that the operator hijacked your dns, Try modifying it locally hosts file
Usage expansion , Inside net fishing :
msf Create a Trojan , Let the target resolve to the server you set up , Build a website on the server , Prompt to download and upgrade the browser plug-in , Induced download generated Trojan
service apache2 start // start-up apache The server , Remember to drive 80 port
cp test.exe /var/www/html // Put the Trojan under the page
Limited ability , The page of inducing downloading and upgrading browser plug-ins cannot be written ,,, No code found , Subsequent patch ,,,
边栏推荐
- Network disk installation
- Debug:==42==ERROR: AddressSanitizer: heap-buffer-overflow on address
- 【FAQ】华为帐号服务报错 907135701的常见原因总结和解决方法
- Velodyne configuration command
- Legion is a network penetration tool
- OSPF summary
- [Galaxy Kirin V10] [server] system startup failed
- What is an excellent architect in my heart?
- MongoDB数据日期显示相差8小时 原因和解决方案
- DML statement of MySQL Foundation
猜你喜欢
Evolution from monomer architecture to microservice architecture
Summary of several job scheduling problems
Tables in the thesis of latex learning
今日睡眠质量记录78分
[Galaxy Kirin V10] [desktop] cannot add printer
Rhcsa day 10 operation
对于程序员来说,伤害力度最大的话。。。
Sword finger offer 05 (implemented in C language)
For programmers, if it hurts the most...
[Galaxy Kirin V10] [desktop] printer
随机推荐
Write a program to judge whether the elements contained in a vector < int> container are 9.20: exactly the same as those in a list < int> container.
VLAN part of switching technology
Remove linked list elements
RHCE day 3
Dynamic memory management
C language - stack
[Galaxy Kirin V10] [server] grub default password
MPLS: multi protocol label switching
Student achievement management system (C language)
When I forget how to write SQL, I
BGP ---- border gateway routing protocol ----- basic experiment
Three schemes of ZK double machine room
Static comprehensive experiment ---hcip1
Linked list operation can never change without its roots
Sword finger offer 05 (implemented in C language)
If the uniapp is less than 1000, it will be displayed according to the original number. If the number exceeds 1000, it will be converted into 10w+ 1.3k+ display
Introduction to tree and binary tree
Delayed message center design
Latex insert picture, insert formula
OSPF summary