<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>DNS Spoofing on Chief Dennis' Blog</title><link>https://chiefdennis.github.io/tags/dns-spoofing/</link><description>Recent content in DNS Spoofing on Chief Dennis' Blog</description><generator>Hugo</generator><language>en</language><lastBuildDate>Sun, 09 Feb 2025 15:43:16 +0100</lastBuildDate><atom:link href="https://chiefdennis.github.io/tags/dns-spoofing/index.xml" rel="self" type="application/rss+xml"/><item><title>ARP and DNS spoofing with Bettercap</title><link>https://chiefdennis.github.io/projects/arp_and_dns_spoofing_bettercap/</link><pubDate>Sun, 09 Feb 2025 15:43:16 +0100</pubDate><guid>https://chiefdennis.github.io/projects/arp_and_dns_spoofing_bettercap/</guid><description>&lt;p>&lt;img src="https://chiefdennis.github.io/projects/arp_and_dns_spoofing_bettercap/Picture0.png" alt="">&lt;/p>
&lt;p>&lt;a href="#introduction" >1. Introduction&lt;/a>&lt;/p>
&lt;p>&lt;a href="#arp-spoofing-attack" >2. Attack Execution&lt;/a>&lt;/p>
&lt;p>&lt;a href="#arp-spoofing-attack" >2.1. ARP Poisoning&lt;/a>&lt;/p>
&lt;p>&lt;a href="#dns-spoofing-attack" >2.2. DNS Spoofing&lt;/a>&lt;/p>
&lt;p>&lt;a href="#fake-web-page-setup" >2.3. Fake Web Page Setup&lt;/a>&lt;/p>
&lt;p>&lt;a href="#credential-theft" >2.4. Credential Theft&lt;/a>&lt;/p>
&lt;p>&lt;a href="#stopping-the-attack" >3. Stopping the attack&lt;/a>&lt;/p>
&lt;p>&lt;a href="#conclusions" >4. Conclusions&lt;/a>&lt;/p>
&lt;h1 id="introduction">
 Introduction
 &lt;a class="heading-link" href="#introduction">
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading">&lt;/i>
 &lt;span class="sr-only">Link to heading&lt;/span>
 &lt;/a>
&lt;/h1>
&lt;p>In the field of cybersecurity, analyzing vulnerabilities in local networks is a fundamental task for understanding potential threats and designing appropriate defense mechanisms. Among the most common attacks affecting the integrity and confidentiality of information in a network are ARP Spoofing and DNS Spoofing, techniques used to intercept, modify, and redirect traffic from devices connected to a LAN.&lt;/p></description></item></channel></rss>