18 July 2008 | 9,016 views

Zodiac – DNS Protocol Monitoring and Spoofing Tool

Check For Vulnerabilities with Acunetix

Zodiac is a DNS protocol analyzation and exploitation program. It is a robust tool to explore the DNS protocol. Internally it contains advanced DNS routines for DNS packet construction and disassembling and is the optimal tool if you just want to try something out without undergoing the hassle to rewrite DNS packet routines or packet filtering.

Features

  • sniffing on all kinds of configured devices (Ethernet, PPP, …)
  • capturing and decoding nearly all types of DNS packets, including packet decompression
  • ncurses driven text based frontend with interactive commandline and multiple windows
  • threaded design allow more flexibility when adding your own features
  • clean code, commented and tested just fine, ready for you to extend
  • internal DNS packet filtering allows installation of pseudo DNS filters you can “select()” on a large set of DNS packet construction primitives
  • DNS name server versioning using BIND version requests
  • DNS local spoofing, answering DNS queries on your LAN before the remote NS
  • DNS jizz spoofing, exploiting a weakness within old BIND versions
  • DNS ID spoofing, exploiting a weakness within the DNS protocol itself

You can download Zodiac 0.4.9 here:

zodiac-0.4.9.tar.gz

Or read more here.



Recent in Exploits/Vulnerabilities:
- Microsoft Schannel Vulnerabilty – Patch It NOW
- Serious Linux/UNIX FTP Flaw Allows Command Execution
- Microsoft Zero Day OLE Vuln Being Exploited In Powerpoint

Related Posts:
- NfSpy – ID-spoofing NFS Client Tool – Mount NFS Shares Without Account
- ArpON v2.2 Released – Tool To Detect & Block ARP Spoofing
- IPAudit – Network Activity Monitor with Web Interface

Most Read in Exploits/Vulnerabilities:
- Learn to use Metasploit – Tutorials, Docs & Videos - 228,155 views
- AJAX: Is your application secure enough? - 119,185 views
- eEye Launches 0-Day Exploit Tracker - 85,082 views

Low-cost VPS Hosting

Comments are closed.