Please Support me so that I can post more contents.
- Scans the local network for devices.
- Allows the attacker to select a target machine.
- Spoofs DNS records to redirect traffic to a phishing page.
- Clone the repository:
git clone https://github.com/DNS-Attack/dns_poisoner.git cd dns_poisoner
- Make it executable
chmod +x setup.sh chmod +x dns_poisoner.sh
- Run the setup script:
./setup.sh
- Launch the DNS poisoner:
./dns_poisoner.sh
- Create a Backend Endpoint Create a Python Flask application to handle the POST request and log credentials to a file or display them in the terminal.
- Run the Server Start the server to listen for incoming POST requests:
python3 server.py
- Log Output When credentials are submitted via the HTML form, they are:
-Logged in the terminal. -Saved to a file named stolen_credentials.txt.
- Terminal Output:
[INFO] Stolen credentials captured: Username=XXXXXXXXXX, Password=•••••
- File Output (stolen_credentials.txt):
Username: XXXXXXXXXX, Password: •••••