Setup
TESTING MODE
Attacker
OS: Kali Linux
echo 1 > /proc/sys/net/ipv4/ip_forward
Victim
OS: Windows*
Deploying Phishing Sites
Open browser
the attacker can test by accessing 127.0.0.1 on the browser
the victim can also connect to a real domain login site (access 10.0.2.4 on the browser)
ettercap's configurations:
modify ec_uid, ec_gid = 0
uncomment linux setting
add your_host.com into target list
ettercap DNS spoofing
stop unified sniffing
scan the hosts
add the victims' ip address to target 1
start MITM attacks: ARP poisoning
enable dns_spoof plugin
start unified sniffing
victim is spoofed
open cmd
the ip address of facebook.com becomes 10.0.2.4
open the browser in private mode and access facebook.com
login!
the account and password are shown on ettercap and usernames.txt
console:
Example scenario:
If your interface is eth0, the router is
92.168.1.1, and the victim is192.168.1.50