Skip to content

titaniumSumit/DNS-Attack

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

13 Commits
 
 
 
 
 
 

Repository files navigation

DNS Poisoner (Educational Tool)

Support:

Please Support me so that I can post more contents.

Buy Me A Coffee

Features

  1. Scans the local network for devices.
  2. Allows the attacker to select a target machine.
  3. Spoofs DNS records to redirect traffic to a phishing page.

Usage

  1. Clone the repository:
    git clone https://github.com/DNS-Attack/dns_poisoner.git
    cd dns_poisoner
  2. Make it executable
    chmod +x setup.sh
    chmod +x dns_poisoner.sh
  3. Run the setup script:
    ./setup.sh
  4. Launch the DNS poisoner:
    ./dns_poisoner.sh
  5. Create a Backend Endpoint Create a Python Flask application to handle the POST request and log credentials to a file or display them in the terminal.
File: server.py
  • Run the Server Start the server to listen for incoming POST requests:
python3 server.py
  1. Log Output When credentials are submitted via the HTML form, they are:

-Logged in the terminal. -Saved to a file named stolen_credentials.txt.

Example Output:
  • Terminal Output:
[INFO] Stolen credentials captured: Username=XXXXXXXXXX, Password=•••••
  • File Output (stolen_credentials.txt):
Username: XXXXXXXXXX, Password: •••••

About

DNS poisoning and related attacks

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published