Performs on-path DNS poisoning. Sniffs on specified interface with optional filter expression for DNS requests. Fabricates DNS response with fake different IP address, and sends it to the original requestor, arriving before DNS response from (far away) legitimate server.
dnspoison.py [-h] [-i [interfaceName]] [-f hostnames.txt] [-e BPF]
optional arguments:
-h, --help show this help message and exit
-i [interfaceName] specify interface to sniff packets on. Automatically
picks if none specified.
-f hostnames.txt specify ip hostname pairs to hijack. 1 pair per
hostname, separated by whitepace
-e BPF specify BPF expression