In this recipe, we will discuss how to perform DNS and ARP spoofing. In several of our past recipes, we have shown website attacks that utilize an IP address for the attack—the IP of the Kali machine. However, in real attacks, this may easily be spotted. The whole point of the attack is to make it appear as if they are going to the proper site and making it appear as real as possible. The first part of this process is to perform DNS spoofing.
DNS spoofing and ARP spoofing
Getting ready
Let's ensure the following prerequisites:
- Kali Linux is running, and you are logged in as root
- Move the interface from one of your Windows test machines to the NAT network temporarily