Provided by: dsniff_2.4b1+debian-34_amd64 bug

NAME

       dnsspoof - forge replies to DNS address / pointer queries

SYNOPSIS

       dnsspoof [-i interface] [-f hostsfile] [expression]

DESCRIPTION

       dnsspoof  forges  replies  to  arbitrary  DNS  address  /  pointer  queries on the LAN. This is useful in
       bypassing hostname-based access controls, or in implementing a variety of man-in-the-middle attacks.

OPTIONS

       -i interface
              Specify the interface to use.

       -f hostsfile
              Specify the pathname of a file in  hosts(5)  format.  Only  one  hostname  allowed  per  line  (no
              aliases), although hostnames may contain wildcards (such as *.doubleclick.net).

       expression
              Specify a tcpdump(8) filter expression to select traffic to sniff.

       If no hostsfile is specified, replies will be forged for all address queries on the LAN with an answer of
       the local machine's IP address.

FILES

       /usr/share/dsniff/dnsspoof.hosts
              Sample hosts file.

SEE ALSO

       dsniff(8), hosts(5)

AUTHOR

       Dug Song <dugsong@monkey.org>

                                                                                                     DNSSPOOF(8)