Skip to content
DNS Exfiltration tool for stealthily sending files over DNS requests.
Python
Branch: master
Clone or download

Latest commit

Latest commit 8b5ed85 May 16, 2019

Files

Permalink
Type Name Latest commit message Commit time
Failed to load latest commit information.
LICENSE Initial commit Aug 11, 2015
README.md Update README.md May 16, 2019
dnsteal.py Update dnsteal.py May 16, 2019

README.md

dnsteal v 2.0

This is a fake DNS server that allows you to stealthily extract files from a victim machine through DNS requests.

Below are a couple of different images showing examples of multiple file transfer and single verbose file transfer:

Alt text

  • Support for multiple files
  • Gzip compression supported
  • Now supports the customisation of subdomains and bytes per subdomain and the length of filename

See help below:

Alt text

If you do not understand the help, then just use the program with default options!

python dnsteal.py 127.0.0.1 -z -v

This one would send 45 bytes per subdomain, of which there are 4 in the query. 15 bytes reserved for filename at the end.

python dnsteal.py 127.0.0.1 -z -v -b 45 -s 4 -f 15

This one would leave no space for filename.

python dnsteal.py 127.0.0.1 -z -v -b 63 -s 4 -f 0
You can’t perform that action at this time.