There are SOOOO many ways to hack a system or network, which means you need to think creatively in order to be successful.
Many novice hackers focus way too much energy on cracking passwords (which should be a last resort unless you have specialized tools or a 10,000 machine botnet) or exploiting a vulnerability in an operating system (increasingly rare). With all the protocols that computer systems use (DNS, SMTP, SMB, SNMP, LDAP, DHCP, etc), there is bound to be a vulnerability in one that we can exploit to get what we're after.
DNS Spoofing: Redirecting Users to Your Website
In this hack, we will be exploiting the Domain Name Service (DNS). As you know, DNS is used for domain name resolution or converting a domain name such as www.hackers-arise.com to an IP address, 184.108.40.206. If we can mess with this protocol, we could very well send some one looking for a domain name such as www.bankofamerica.com to our malicious website and harvest their credentials.
Dug Song of the University of Michigan developed a suite of hacking tools that are excellent for this purpose. We have already used one of his tools, arpspoof, for doing a man-in-the-middle attack. In this attack, we will be using his dnsspoof tool, which will enable us to spoof DNS services on a local area network.
Remember, even though this hack requires that you be on the same LAN, you could get access to the LAN through a remote vulnerability or a weak password on just ONE machine on the network. In institutions with thousands of computers on their network, that means you must find a single machine that is exploitable to be able implement this attack for the entire network.
Step 1: Fire Up Kali
Let's get started by firing up Kali.
Step 2: Open dnsspoof
Depending upon what version of Kali you are using, you may be able to find dnsspoof in the menu system under Sniffing or you can always get to it by opening a terminal and typing dnsspoof. If we add the -h switch for help, we should be the following help screen.
Notice how simple the syntax is.
dnsspoof -i <interface> -f <hostsfile>
Step 3: Set Up for Sniffing
We will trying to get a Windows 7 system on our network to redirect its www.bankofamerica.com navigation to our own website.
Let's use Google Chrome, or any browser, to navigate there.
This is what it looks like.
Step 4: Flush the DNS Cache
First, we need to flush the DNS cache of the Windows 7 system. In this way, the Windows client won't use the cached DNS on the system and will instead use our "updated" DNS service. In reality, this step is not necessary, but for our demonstration it speeds things up.
First, close the browser, open a cmd.exe prompt and type:
Now we need to set our network card on our Kali server to promiscuous mode (she, your network card, will accept anyone's packets).
kali > ifconfig eth0 promisc
Now we need to kill the connection between the Windows 7 system and www.bankofamerica.com. This forces the Windows 7 machine user to re-authenticate. From Kali type;
kali > tcpkill -9 host www.bankamerica.com
After killing www.bankofamerica.com, stop the tcpkill with a Ctrl+C
Step 5: Edit Hosts File
In my Linux tutorial networking, I showed you how the hosts file in Linux acts like a static (unchanging) DNS. Here we will be using the hosts file to redirect that Windows 7 system's search for Bank of America to our website. Let's go to the /etc directory.
kali >cd /etc
From there, let's open the hosts file in any text editor. Let's use leafpad.
kali > leafpad hosts
Now that we have the hosts file open, we need to add the following line to it. Remember, the hosts file is simply mapping an IP address to a domain name, so we put our IP address in and map it to www.bankofamerica.com.
It's important here to use the TAB key between the IP address and the domain. Spaces will be interpreted by the system to be part of the domain name.
Step 6: Create a New BoA Webpage
Before we go any further, we now need to turn off promiscuous mode on our network card (she decided to commit to you and only you).
kali > ifconfig eth0 -promisc
Now we need to create a website that the user will be directed to when they type www.bankofamerica.com in the URL of their browser.
If we type our loopback or "home" IP address into our browser, we see the default webpage of Apache. This is what we need to replace.
Let's create a simple webpage. If you want more info on how to create a simple webpage and host it in Linux, check out my coming Linux guide on Apache web servers.
Now open the index.html file.
kali> leafpad /var/www/html/index.html
This is what it looks like by default. We want to change it and put in the following html and save it.
<html> <body> <h1>This is the Fake Bank of America Web Site! </h1> </body> </html)>
Of course, if you really wanted to pull off this hack in the real world, you would want to take the time to build a website that looks and acts just like the site you're spoofing, but that is another tutorial entirely. Keep in mind that tools such as httrack can download and copy entire web sites.
Step 7: Start a the Apache Web Server
Now, start the web server built into Kali. This is Apache and the service is HTTP, so we go to Kali Linux -> System Services -> HTTP, and finally, apache2 start. This will start our web server on our Kali system hosting the fake Bank of America website. Of course, if you are more comfortable using the command line, you can start the apache2 webserver by typing;
kali > services apache2 start
Step 8: Start Dnsspoof
In our last step, we need to start dnsspoof and direct users to the entries in our "hosts" file first. Dnsspoof will intercept DNS queries and send them first to our hosts file before then sending them along to the DNS server. In this way, if we have any entry in our hosts file that the client is looking for, it will directed as specified by our hosts file.
Remember, we mapped www.bankofamerica.com to our IP address so that they will go to OUR web server and see OUR website.
kali > dnsspoof -f hosts
Step 9: Navigate to BoA from Windows 7
Now, from the Windows 7 system, type in the URL www.bankofamerica.com and it will pull up our fake website vs. the real Bank of America site like below.
Now, when anyone on the local area network attempts to navigate to the Bank of America website, they will instead come to our website!
As you can imagine, with dnsspoof in place, we can wreak all kinds of havoc on a LAN!