Redirect LAN users wherever you want

A couple of days ago I showed you how to spy on other users on your LAN using arpspoof well this builds on that topic and puts you in the drivers seat. We’re going to use dnsspoof another tool in the dsniff suite. dnsspoof is a tool that allows you to pretend to be a users DNS server and basically reply to their DNS requests with whatever you like. For example if they try to go to you could redirect to

Needless to say you can have a lot of fun with this tool.

So the first thing we need to do is creat a hosts file for dnsspoof. The hosts file will define all the hosts or DNS records we want to forge. So continuing with my Netscape/Dig example we’ll need the IP address of the server is hosted at. To get this we can run the following command from a command prompt.

host has address mail is handled by 0

So this tells us is hosted at the ip

So we need to create a host file to define this redirection now.

Open up a file in your favorite text editor and make it look like the example below. *

Now what we’ve defined here is that anytime dnsspoof sees a request for (eg,, etc) we’re going to send a DNS reply pointing to the IP address instead of the real IP address.

So lets save this file as host.txt. Make sure it’s somewhere you can find it.

Now we need to open up a command prompt window and start ARP Spoofing (See This post). Once we’re started with that we can start dnsspoof with the following command

sudo dnsspoof -f ./host.txt

And you should see output like below

dnsspoof: listening on en0 [udp dst port 53 and not src your.pc.s.ip]

Now just sit back and wait for your mark to start browsing and you should see the DNS requests scroll by in your command prompt. And despite all their trying they simply won’t be able to get to There are actually a lot of more legitimate uses for this tool. I know some people who use it to block questionable content or advertising on their LAN.

As always let me know if you have any questions or comments in the comments of this post.

If you enjoyed this post, make sure you subscribe to my RSS feed!

Published by


I'm a self labeled Nerd who enjoys Playing Video Games, restoring classic muscle cars (i have a 65' Mustang in the works) , Running Big Data Clusters, Tattoos, Working on System Automation, Riding and customizing Motorcycles, and writing python Code. I'm an SRE with DemonWare/Activision Specializing in Big Data/Hadoop operations but all opinions and views expressed on this site are solely my own.