#
pretender
An awesome tool designed "with the single purpose to obtain machine-in-the-middle positions combining the techniques of mitm6 and only the name resolution spoofing portion of Responder." (source: Pretender GitHub and blog). We also covered this tool a bit on one of our Tuesday TOOLSday episodes.
#
Dry run to see hostnames being resolved (but not poison them)
pretender -i eth0 --dry-run
#
Selectively poison just a hostname called SERVER01
pretender -i eth0 --spoof server01
#
Selectively poison just a hostname called SERVER01 with logging
This command logs everything to log.log and then hides everything from the terminal except spoof actions:
pretender -i eth0 --spoof server01 -l log.log --hide-ignored
#
Video demo
Here's a Tuesday TOOLSday video we did over at 7MinSec.club about Pretender: