Powershell Local DNS Poisoning

Powershell Local DNS Poisoning
Download Copy
Title: Powershell Local DNS Poisoning
Author: SammyTheBEAST

Redirects a given domain name to the target IP address. Uses the run prompt and Powershell to edit the hosts file, should work with any Windows version with those features but only tested on Windows 10. Change the variables under "options" in the setup stage before executing.

Phishing is a popular technique for gaining access to a target. Generally, phishing is a digitally delivered social engineering method. Phishing techniques may use a wide net, or specifically target one role or individual — known as spearphishing. Many phishing campaigns involve tricking a target into divulging confidential information, such as by mimicking a known-trusted source — be it a website or person. See all phishing payloads.

This payload is for the Bash Bunny. Simultaneously mimic multiple trusted devices to trick targets into divulging sensitive information without triggering defenses. The Bash Bunny is truly the world's most advanced USB attack platform.

Submit your own payload, or browse more featured Bash Bunny Payloads.

 

 

Related Payloads

capture http credentials
capture http credentials
This payload uses inotifywait and DYNAMICPROXY to monitor the HTTP POST data streams generated by a client and extract s
Read More
WAR GAMES
WAR GAMES
A text adventure game inspired by the 1983 film WarGames. Set in December 2025, you play as James Lightman, son of the l
Read More
Strip Connected Clients
Strip Connected Clients
Pulls previously connected clients from the recon database and stores that list in a file located in /root/loot/info.
Read More