Spoofing, at its core, is pretending to be someone else. We have looked at how to build exploit code, but one of the challenges we face is how to leverage network trusts and processes to escalate privileges on the network and reach more places to leverage that shellcode.
In this chapter, we cover the following topics:
• ARP spoofing with Ettercap
• DNS spoofing with Evilgrade
• NetBIOS and LLMNR spoofing with Metasploit and Responder
Spoofing allows us to impersonate other systems. In computer systems and networks, this is beneficial because spoofing attacks allow us to leverage trusts between systems to escalate privileges on a network. ...