Provided by: dsniff_2.4b1-13_i386
dnsspoof - forge replies to DNS address / pointer queries
dnsspoof [-i interface] [-f hostsfile] [expression]
dnsspoof forges replies to arbitrary DNS address / pointer queries on
the LAN. This is useful in bypassing hostname-based access controls, or
in implementing a variety of man-in-the-middle attacks.
Specify the interface to use.
Specify the pathname of a file in hosts(5) format. Only one
hostname allowed per line (no aliases), although hostnames may
contain wildcards (such as *.doubleclick.net).
Specify a tcpdump(8) filter expression to select traffic to
If no hostsfile is specified, replies will be forged for all address
queries on the LAN with an answer of the local machine’s IP address.
Sample hosts file.
Dug Song <firstname.lastname@example.org>