# pretender

An awesome tool designed "with the single purpose to obtain machine-in-the-middle positions combining the techniques of mitm6 and only the name resolution spoofing portion of Responder." (source: Pretender GitHub and blog). We also covered this tool a bit on one of our Tuesday TOOLSday episodes.

# Dry run to see hostnames being resolved (but not poison them)

pretender -i eth0 --dry-run

# Selectively poison just a hostname called SERVER01

pretender -i eth0 --spoof server01

# Selectively poison just a hostname called SERVER01 with logging

This command logs everything to log.log and then hides everything from the terminal except spoof actions:

pretender -i eth0 --spoof server01 -l log.log --hide-ignored

# Video demo

Here's a Tuesday TOOLSday video we did over at 7MinSec.club about Pretender: