ARP spoofing or ARP cache poisoning is a technique by which an attacker sends spoofed ARP packets onto a LAN. Basically the attacker machine fools the gateway and the victim machine into exchanging network packets via the attacker machine. This allows the attacker machine to intercept network packets that are travelling between the gateway and the victim machine.
DNS spoofing, also referred to as DNS cache poisoning in which spoofed Domain Name System data is injected into a DNS resolvers cache, causing the name server to return an incorrect IP address or the IP address you as an attacker chose. Once the victim is DNS spoofed any DNS request coming from the victim machine the website that the attacker specified will be redirected to a malicious website.
This program is used to first ARP poison the victim machine in order to get the traffic flow via attacker. And then using DNS spoof redirect to a malicious website.
Our program use the following flags in order to successfully DNS spoof a victim machine.
- **-h, --help:**Used to display the usage information
- **-i, --interface:**Local interface of the network card IP address to Spoof
- **-d, --destination:**IP address to Spoof
- **-r, --router:**IP address of the gateway/router
- **-w, --webiste:**To Spoof (Can you multiple websites) To redirect to
- -n, --new_website: The webiste to redirect
- **-t, --title:**Process name
- pip install netfilterqueue
- pip install setproctitle
- dnf install scapy