diff options
| author | 韩丁康 <[email protected]> | 2024-05-29 04:40:56 +0000 |
|---|---|---|
| committer | 韩丁康 <[email protected]> | 2024-05-29 04:40:56 +0000 |
| commit | e755b2e1c76596e634243c42449bd8b3c9fe1b4e (patch) | |
| tree | a5adaf6b0130f110d073a1c6f501831f37f6b6ce | |
| parent | e69b5de383b572b4138e04be2c4ff68e0e50853e (diff) | |
| parent | 3216020518086de305c1103b3b2960429e9b3a50 (diff) | |
readme更新
See merge request handingkang/fakedns6!1
| -rw-r--r-- | Readme.md | 39 |
1 files changed, 2 insertions, 37 deletions
@@ -1,38 +1,3 @@ -# How to run - -## Requirements - -- An IP-spoofing-capable host (preferably Linux) -- A domain (attacker-controlled name server) -- Other things needed to make clear: - - The resolver to poison (victim resolver) - - The domain to poison (victim domain) - - *The **victim domain**'s record will be poisoned on the **victim resolver**.* - -## Overview - -- Flood query traffic to mute the name server of the victim domain. -- Run attack program to guess the port number and TxID automatically. - -## Steps - -1. Compile - - ```go build ucr.edu/saddns```(requires ```gopacket``` and ```libpcap```) - -2. Start flooding - - ```./dns_query.sh &```(requires ```hping3```) - - Please see the comment in the file for usage. - -3. Start attacking (flooding is still in progress) - - ```sudo ./saddns [args]``` - - Run ```./saddns -h``` for usage. - -```attack.sh``` is a sample script for finish the whole PoC (both Step 2 & 3) including the verification of the poisoned result. It's a demonstrative script and please modify the code accordingly (it **won't** run by default). - - +## 使用说明 +./attack.sh 【目标解析器IP】【想要将AAAA记录修改指向的IPv6地址】 【发包网口(例如eth0)】 【目标域名】【目标权威服务地址】 |
