• caglararli@hotmail.com
  • 05386281520

Fake access-point + custom DNS-server to intercept mobile app credentials?

Çağlar Arlı      -    18 Views

Fake access-point + custom DNS-server to intercept mobile app credentials?

Would it be possible to create a fake twin access-point for a router with a custom DNS-configuration in a way to fool mobile apps like for example Instagram to send authentication requests to my own server instead of the Instagram servers?

Normally when someone opens an app like Instagram a request gets send through their router which forwards it to the ISP's DNS-server. The DNS-server retrieves the IP (179.60.195.174) of instagram.com to authenticate the user.

But what if the user uses my fake twin access point for a wi-fi connection and my fake access points instagram.com to e.g 192.168.1.2 which will contain a basic Apache-server showcasing the Instagram login-page? Or in case the Instagram-app does not use a web-view for their app but sends the credentials to 179.60.195.174 it will send the credentials to 192.168.1.2.

Is this a possible attack? Would DNS-cache be an issue?