In this talk, I will talk about the history of how blackhats have been using DNS hijacking. I will then talk about the underlying technology of these attacks. Most notably how DNS hijacking works and how attackers use CSRF to change a router's DNS server. I then go on to talk about how a pentester can weaponize similar attacks using DHCP. I also will be talking about a tool I have been building that enables pentesters to do DNS hijacking attacks to move laterally within a network or to dynamically execute high quality phishing attacks. Lastly I talk about how to defend against dns hijacking and the attacks I mention as well as the systemic problems that lead to things being vulnerable to these attacks.