Powershell Local DNS Poisoning

Powershell Local DNS Poisoning
Download Copy
Title: Powershell Local DNS Poisoning
Author: SammyTheBEAST

Redirects a given domain name to the target IP address. Uses the run prompt and Powershell to edit the hosts file, should work with any Windows version with those features but only tested on Windows 10. Change the variables under "options" in the setup stage before executing.

Phishing is a popular technique for gaining access to a target. Generally, phishing is a digitally delivered social engineering method. Phishing techniques may use a wide net, or specifically target one role or individual — known as spearphishing. Many phishing campaigns involve tricking a target into divulging confidential information, such as by mimicking a known-trusted source — be it a website or person. See all phishing payloads.

This payload is for the Bash Bunny. Simultaneously mimic multiple trusted devices to trick targets into divulging sensitive information without triggering defenses. The Bash Bunny is truly the world's most advanced USB attack platform.

Submit your own payload, or browse more featured Bash Bunny Payloads.

 

 

Related Payloads

Stunnel
Stunnel
pass a unsecure protocol through a SSL connection
Read More
Hash Slinging Stasher
Hash Slinging Stasher
This payload copies files to Bash Bunny udisk from the target OS matching given extensions and file size while checking
Read More
Screenshare Over LAN
Screenshare Over LAN
This payload starts up a HTTP server and streams the local desktop to a browser window for other devices on the network.
Read More