Powershell Local DNS Poisoning

Powershell Local DNS Poisoning
Download Copy
Title: Powershell Local DNS Poisoning
Author: SammyTheBEAST

Redirects a given domain name to the target IP address. Uses the run prompt and Powershell to edit the hosts file, should work with any Windows version with those features but only tested on Windows 10. Change the variables under "options" in the setup stage before executing.

Phishing is a popular technique for gaining access to a target. Generally, phishing is a digitally delivered social engineering method. Phishing techniques may use a wide net, or specifically target one role or individual — known as spearphishing. Many phishing campaigns involve tricking a target into divulging confidential information, such as by mimicking a known-trusted source — be it a website or person. See all phishing payloads.

This payload is for the Bash Bunny. Simultaneously mimic multiple trusted devices to trick targets into divulging sensitive information without triggering defenses. The Bash Bunny is truly the world's most advanced USB attack platform.

Submit your own payload, or browse more featured Bash Bunny Payloads.

 

 

Related Payloads

Google Exfil
Google Exfil
This payload runs Powershell script that zips google user data, uses gofile.io api to upload it, and then sends a downlo
Read More
Defend Yourself From CVE-2023-23397
Defend Yourself From CVE-2023-23397
This script sets a Firewall rule that will defend you against CVE-2023-23397.
Read More
The Perfect Stealthy Payload
The Perfect Stealthy Payload
Opens PowerShell as admin, creates a folder in Windows/temp called Cache, adds exclusion in Defender, downloads the payl
Read More