Aranea is a fast and clean dns spoofing tool.
C
Latest commit 469b9ee Sep 20, 2011 @crossbowerbt crossbowerbt chonged README
Permalink
Failed to load latest commit information.
Makefile first commit Sep 18, 2011
README chonged README Sep 20, 2011
aranea.c first commit Sep 18, 2011
aranea.h first commit Sep 18, 2011
argparser.h first commit Sep 18, 2011
dns_processing.h first commit Sep 18, 2011
hexinject.h first commit Sep 18, 2011
hosts.txt first commit Sep 18, 2011
resolver.h first commit Sep 18, 2011

README

Aranea - Fast dns spoofing tool
(c) 2011 Emanuele Acri <crossbower@gmail.com>

Project site: https://github.com/TigerSecurity/aranea

General description:
--------------------

Aranea is a fast DNS Spoofing tool, based on libpcap.
It's multithread, clean, and very flexible.
It uses regular expressions to specify hostnames.

Compile:
--------

To compile the tool you need only libpcap-dev.
On debian you can install the dependencies with:

# apt-get install libpcap-dev

Using only libpcap to inject packets, the tool can be easily compiled
on platform on every platform supported by the library.

Usage:
------

Aranea is very simple to use.
It must be run as root, specifying at least the option '-f':

# aranea -f hosts.txt

where 'hosts.txt' is a correctly formatted hosts-file.

The hosts-file format used by aranea is very similar to /etc/hosts,
the major difference is that domain names are regular expressions and not
play strings.

For example, if you want to redirect the host google.com and its subdomains
to kittenwar.com (may the cutest kitten win!) you must add to the hosts-file
a line similar to this one:

205.196.209.62 google\.com

Instead of the wildcards you can use '.+' to match a generic sequence
of characters.

For example, a global redirection to kittenwar.com (unhealthy idea...)
looks like this:

205.196.209.62 .

If you need more informations about regular expressions, an excellent reference is http://www.regular-expressions.info/