Skip to content

Performs on-path DNS poisoning. Sniffs on specified interface with optional filter expression for DNS requests. Fabricates DNS response with fake different IP address, and sends it to the original requestor, arriving before DNS response from (far away) legitimate server.

Notifications You must be signed in to change notification settings

khan-ibrahim/DNS-Poison

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

9 Commits
 
 
 
 
 
 

Repository files navigation

DNS-Poison

Python 3.7.6

Performs on-path DNS poisoning. Sniffs on specified interface with optional filter expression for DNS requests. Fabricates DNS response with fake different IP address, and sends it to the original requestor, arriving before DNS response from (far away) legitimate server.

Usage

dnspoison.py [-h] [-i [interfaceName]] [-f hostnames.txt] [-e BPF]

optional arguments:
  -h, --help          show this help message and exit
  -i [interfaceName]  specify interface to sniff packets on. Automatically
                      picks if none specified.
  -f hostnames.txt    specify ip hostname pairs to hijack. 1 pair per
                      hostname, separated by whitepace
  -e BPF              specify BPF expression

About

Performs on-path DNS poisoning. Sniffs on specified interface with optional filter expression for DNS requests. Fabricates DNS response with fake different IP address, and sends it to the original requestor, arriving before DNS response from (far away) legitimate server.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages