Skip to content

edoardoPredieri/DNS_Cache_Poisoning_Exploit

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

1 Commit
 
 
 
 
 
 

Repository files navigation

This attack consists of inserting a DNS record into the cache of the DNS nameserver dnsserver which binds an arbitrary IP to the name banko- fallan.co.uk. In this way all future requests destined to bankofallan.co.uk’s dnsserver will obtain as reply the arbitrary IP embedded in the caches. To simulate this attack we have used a virtual machine (vulnDNS) that con- tains the dnsserver and its environment and a normal computer that simu- lated the attacker, which controls the domain badguy.ru and the nameserver for this domain.

In order to execute the exploit, please follow these steps:

In vulnDNS type: $ route add default gw 192.168.56.1 $ service vulnDNS restart

In Attacker's PC type: $ sudo pip2 install dnslib $ sudo ip addr add 10.0.0.1 dev lo

Inside exploit.py change the global variable "ip_attacker" with the attacker's machine IP.

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages