Metasploit: DNS Spoofing through a Proxy PAC File
This module configures Internet Explorer to use a PAC proxy file. By using the LOCAL_PAC option a local PAC file will be created in the victim host. It's also possible to specify a remote PAC file (REMOTE_PAC option) by providing the URL. http://www.shelliscoming.com/2013/12/metasploit-controlling-internet.html
This module configures Internet Explorer to use a PAC proxy file. By using the LOCAL_PAC option a local PAC file will be created in the victim host. It's also possible to specify a remote PAC file (REMOTE_PAC option) by providing the URL. http://www.shelliscoming.com/2013/12/metasploit-controlling-internet.html