Skip to content

SemyonMakhaev/dns-poison

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

DNS-poison

DNS-server cache poisoning tool

Description

This program is trying to put a fake data to a target DNS-server cache. It sends a DNS-request to server and then it sends a DNS-reply to all of server ports, so the program imitates a forwarder of this server.

Program sends a forwarder reply to all of ports because it can't predict which port is server waiting for response. If the program sends a forwarder response to server earlier than a real forwarder then a fake information will be written in the server cache.

A DNS-server interrraction protocol and packages formats are described in RFC 1035

Usage

python3 poison.py [-h] server name address

Arguments

Args Description
server IP-address of a target server
name Requested domain name
address IP-address of domain this name for writing to server cache
-h or --help Show a help message

Releases

No releases published

Packages

No packages published