
A Python ARP and DNS Spoofer CLI and INTERFACE
CLI -> advanced pentesters
INTERFACE -> beginners
SetUp
Make sure you installed Python/Python3
Please, install netfilterqueue and scapy as prerequisites
ARP Spoof
CLI
python arp_spoof_nxgenspf.py [-s] [-a]
WARNING : You cannot use both !
[-s] : single target
[-a] : all network is targeted
Please, know the IP ADDRESSE(S) of the network/victim you want to attack.
INTERFACE
Example:
interface = eno1
@IP TARGET = 192.168.10.9
DNS SPOOF
PLS, USE IT RIGHT AFTER YOU LAUNCHED ARP SPOOF
CLI
"www." are not ALWAYS useful for the domain name.
You can edit the file to spoof any domain you want.
INTERFACE
Example
DNS NAME = google.com
DNS @IP = <your malicious web server>
GitHub - saladandonionrings/nextgen_spoofer: python tkinter arp / dns spoof
python tkinter arp / dns spoof. Contribute to saladandonionrings/nextgen_spoofer development by creating an account on GitHub.