Dear Readers: HWS has recently started a new project for the students of engineering ====> The Engineering Projects


Write at HWS !!!

Guest Posting

Friday, March 16, 2012

ARP-DNS Spoofing Attack using Cain & Abel.






Hey guys today i'm writing a very simple and interesting tutorial on DNS spoofing or poisoning attack using Cain & Abel.

DNS SPOOFING

DNS spoofing or DNS cache poisoning is a computer hacking attack in which data is introduced into a Domain Name System(DNS) name servers cache database, which causes the name server to return to an incorrect ip address, diverting traffic to another computer.
In simple words, it redirects the traffic to another website.



For example the victim wants to open www.facebook.com but is redirected to www.myspace.com

CAIN & ABEL

                                                                   Download Here

TUTORIAL


  • Install Cain & Abel and open it, go to configure and select your adapter.



  • Select Sniffer option and then select the start/stop sniffer option from the toolbar. Right click in the white area and then click on scan MAC addreses. 





  • After scanning click on the APR option in the left bottom corner. Then click on the + sign in the top and select the computers you want to mess with.


  • After that select APR-DNS and again click on + sign to add websites. (Now here i have entered www.facebook.com), then click on resolve and type the website name that  you want to open up instead of www.facebook.com. (i have given www.myspace.com)








  • Now click on the start/stop option. 

  • Now wait for a minute and see what happens to the victim. (In my case when the victim will open www.facebook.com he will be redirected to www.myspace.com). You can use any websites of your choice.


VIDEO TUTORIAL



So this is it guys, hope you like it, comment for any queries  :)


Regards,
Sheharyar Sikandar

About the Author

I am XEO Hacker, the founder of Hack With Style (HWS). I am blogging since 2009 before that I just search things and now I am sharing my knowledge through this plateform.I'm also a freelance writer on topics related to Website Hacking,Website Optimization (SEO), blogger customizations and making money online.
In 61 people's circles

Subscribe To Get FREE Tutorials!


Respected Readers:
As a 21 year old student, the only income I rely on is my pocket money. Bearing the running costs of HWS Blog has become really difficult. We educate thousands of bloggers a week with our tutorials. To help us go forward with the same spirit, a small contribution from your side will highly be appreciated.

9 comments:

Appreciate this unique article, I truly loved reading through your publish. Appreciate discussing so nice useful ideas, I thank you for work. Continue the good work and that i aspire to see more posts later on. dan post womens boots

tried the same with AyCarrumba and also C & A. worked both like a charm.

it's redirecting....
but after redirecting to the fake fb page then when the users click the login button in my fake fb page, i want it to redirect to the original fb page, how shall i do that???

@ABD
You can have action attribute of form tag in phishing page as some php page in your server where you can store userid and password in database and redirect the response to original facebook page.

Confused? Feel free to ask

Your feedback is always appreciated. I will try to reply to your queries as soon as time allows.
Note:-
Please do not spam Spam comments will be deleted immediately upon my review.

Regards,
XEO Hacker

Post a Comment

Twitter Delicious Facebook Digg Stumbleupon Favorites More

 

Recent Posts

Join Me On Facebook

700+ Followers

Followers


meet women in Ukraine contatore visite website counter
DMCA.com

Recent Comments

Follow Me On Twitter

1112+ Followers