Powershell Local DNS Poisoning

Powershell Local DNS Poisoning
Download Copy
Title: Powershell Local DNS Poisoning
Author: SammyTheBEAST

Redirects a given domain name to the target IP address. Uses the run prompt and Powershell to edit the hosts file, should work with any Windows version with those features but only tested on Windows 10. Change the variables under "options" in the setup stage before executing.

Phishing is a popular technique for gaining access to a target. Generally, phishing is a digitally delivered social engineering method. Phishing techniques may use a wide net, or specifically target one role or individual — known as spearphishing. Many phishing campaigns involve tricking a target into divulging confidential information, such as by mimicking a known-trusted source — be it a website or person. See all phishing payloads.

This payload is for the Bash Bunny. Simultaneously mimic multiple trusted devices to trick targets into divulging sensitive information without triggering defenses. The Bash Bunny is truly the world's most advanced USB attack platform.

Submit your own payload, or browse more featured Bash Bunny Payloads.

 

 

Related Payloads

TCPDump
TCPDump
Dumps networking-data to USB storage. Completes on button-press or storage full.
Read More
Minimalistic web intercept
Minimalistic web intercept
Replace HTTP with Squirrels.
Read More
DNS Sinkhole
DNS Sinkhole
Demonstrate sinkholing a DNS domain
Read More