# pretender
An awesome tool designed "with the single purpose to obtain machine-in-the-middle positions combining the techniques of mitm6 and only the name resolution spoofing portion of Responder." (source: Pretender [GitHub](https://github.com/RedTeamPentesting/pretender) and [blog](https://blog.redteam-pentesting.de/2022/introducing-pretender/)).  We also covered this tool a bit on one of our [Tuesday TOOLSday](https://www.7minsec.club/p/tuesday-toolsday-pretender) episodes.

## Dry run to see hostnames being resolved (but not poison them)
```
pretender -i eth0 --dry
```

## Selectively poison *just* a hostname called SERVER01
```
pretender -i eth0 --spoof server01
```

## Selectively poison *just* a hostname called SERVER01 with logging
This command logs everything to `log.log` and then hides everything from the terminal except spoof actions:

```
pretender -i eth0 --spoof server01 -l log.log --hide-ignored
```

## Video demo
Here's a Tuesday TOOLSday video we did over at [7MinSec.club](https://7minsec.club) about Pretender:

<div style="padding:56.25% 0 0 0;position:relative;"><iframe src="https://player.vimeo.com/video/1135785717?badge=0&amp;autopause=0&amp;player_id=0&amp;app_id=58479" frameborder="0" allow="autoplay; fullscreen; picture-in-picture; clipboard-write; encrypted-media; web-share" referrerpolicy="strict-origin-when-cross-origin" style="position:absolute;top:0;left:0;width:100%;height:100%;" title="Pretender: the power of MITM6 plus JUST spoofing powers of Responder"></iframe></div><script src="https://player.vimeo.com/api/player.js"></script>
