The autopwn with DNS spoofing and MITM attacks

The primary motive behind all attacks on a victim's system is to gain access with minimal detection, and the lowest risk of catching the eye of the victim.

Now, we have seen the traditional browser autopwn attack and its modification to hack into the website's target audience as well. Still, we have the constraint of sending the link to the victim somehow.

Nevertheless, in this attack, we will conduct the same browser autopwn attack on the victim, but in a different way. In this case, we will not send any links to the victim. Instead, we will wait for them to browse to their favorite websites.

This attack will work only in the LAN environment. This is because to execute this attack we need to ...

Get Mastering Metasploit - Third Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.