dns2proxy – Offensive DNS server


dns2proxy is an offensive DNS server that offers various features for post-exploitation once you’ve changed the DNS server of a victim.

dns2proxy - Offensive DNS server

It’s very frequently used in combination with sslstrip.

Features

  • Traditional DNS Spoofing
  • Implements DNS Spoofing via Forwarding
  • Detects and corrects changes for sslstrip to work

Usage

Using the spoof.cfg config file with the format:

Or you can use domains.cfg file to spoof all hosts of a domain (wildcard):

Hostnames at nospoof.cfg will not be spoofed.


Config Files

domains.cfg – resolve all hosts/subdomains for the listed domains with the given IP.

spoof.cfg – Spoof a single host with a given IP.

nospoof.cfg – Send always a legit response when responding for these hosts.

nospoofto.cfg – Don’t send fake responses to the IPs listed there.

victims.cfg – If not empty, only send fake responses to these IP addresses.

resolv.conf DNS server to forward legitimate queries to.

You can download dns2proxy here:

dns2proxy-master.zip

Or read more here.

Posted in: Hacking Tools, Networking Hacking Tools

, ,


Latest Posts:


CredNinja - Test Credential Validity of Dumped Credentials or Hashes CredNinja – Test Credential Validity of Dumped Credentials or Hashes
CredNinja is a tool to quickly test credential validity of dumped credentials (or hashes) across an entire network or domain very efficiently.
assetfinder - Find Related Domains and Subdomains assetfinder – Find Related Domains and Subdomains
assetfinder is a Go-based tool to find related domains and subdomains that are related to a given domain from a variety of sources including Facebook and more.
Karkinos - Beginner Friendly Penetration Testing Tool Karkinos – Beginner Friendly Penetration Testing Tool
Karkinos is a light-weight Beginner Friendly Penetration Testing Tool, which is basically a 'Swiss Army Knife' for pen-testing and/or hacking CTF's.
Aclpwn.Py - Exploit ACL Based Privilege Escalation Paths in Active Directory Aclpwn.Py – Exploit ACL Based Privilege Escalation Paths in Active Directory
Aclpwn.py is a tool that interacts with BloodHound< to identify and exploit ACL based privilege escalation paths.
Vulhub - Pre-Built Vulnerable Docker Environments For Learning To Hack Vulhub – Pre-Built Vulnerable Docker Environments For Learning To Hack
Vulhub is an open-source collection of pre-built vulnerable docker environments for learning to hack. No pre-existing knowledge of docker is required, just execute two simple commands.
LibInjection - Detect SQL Injection (SQLi) and Cross-Site Scripting (XSS) LibInjection – Detect SQL Injection (SQLi) and Cross-Site Scripting (XSS)
LibInjection is a C library to Detect SQL Injection (SQLi) and Cross-Site Scripting (XSS) through lexical analysis of real-world Attacks.


Comments are closed.