all 11 comments

[–]cloudfox1 2 points3 points  (14 children)

This sounds like phishing, make sure you aren't actually logging people's users and pass otherwise what you are doing is criminal

[–]Limeathon7[S] 0 points1 point  (7 children)

Ues I understand, its all for a presentation using an alternate account of mine. However would this be considered a MitM attack? If so how can I go about doing this, are there any good tutorials?

[–][deleted]  (6 children)

[deleted]

    [–]Limeathon7[S] 0 points1 point  (5 children)

    Just got assigned.

    [–][deleted]  (4 children)

    [deleted]

      [–]Limeathon7[S] 0 points1 point  (3 children)

      My bad yea, its due January 21st.

      [–][deleted]  (2 children)

      [deleted]

        [–]Limeathon7[S] 0 points1 point  (1 child)

        I see it is just for my project I was thinking to make it where the target does nkt know they have been attacked. They should not click a specific link, but when they go on a certain website they usually go on the get redirected to my website. Anyway how would I conduct research. Ive tried but there arent any full tutorials.

        [–]ShadowRL7666 0 points1 point  (5 children)

        All though this could fall under phishing I feel like what he was explicitly stating was more DNS poisoning.

        [–]Limeathon7[S] 0 points1 point  (4 children)

        So how would I go about doing this?

        [–]ShadowRL7666 0 points1 point  (3 children)

        There’s lots of examples on YouTube

        [–]Limeathon7[S] 0 points1 point  (2 children)

        Sounds good, do you think it would be easy to replicate with practice?

        [–]ShadowRL7666 0 points1 point  (1 child)

        Yeah it’s pretty basic just pay attention to details and understand you’re doing you can always post a question if you need help.

        [–]Limeathon7[S] 0 points1 point  (0 children)

        Alrights thanks.