Internal Network Attack Vectors Here are some of the attack vectors to use when you are on the same network as the target is:
Exploiting DNS Servers —This is the easiest way by which you would compromise the DNS
servers and manipulate DNS records.
ARP Spoofing —This can be used to manipulate DNS records. We learned about it in the
“Network Sniffing” chapter (Chapter 6).
DNS Spoofing —Discussed in the “Network Sniffing” chapter (Chapter 6).
Faking an Access Point —You can set up a fake wireless access point, as you are able to control
the DNS; the client would trust all your settings. We will see all about this attack in the
“Wireless Hacking” chapter (Chapter 11).
224 ◾
Ethical Hacking and Penetration Testing Guide External Network Attack Vectors Exploiting DNS Servers —Again, you manage to compromise the DNS server externally, so you
can easily manipulate the records.
DNS Cache Poisoning —DNS cache poisoning can be launched externally to manipulate DNS
records. However, this attack is not that common nowadays and is a bit harder to pull off,
since most of the DNS servers are patched against it.
Evilgrade Console The Evilgrade console is pretty much the same as Cisco’s IOS console, with the same commands.
Let’s take a look at some of the basic commands.
show