-
Notifications
You must be signed in to change notification settings - Fork 14
mistahenry/DNS-Cache-Poisoning-with-Scapy
Folders and files
Name | Name | Last commit message | Last commit date | |
---|---|---|---|---|
Repository files navigation
DNS Cache Poisoning attack against a resolver at 172.17.152.150 and DNS auth server at 172.17.152.149 Trying to set the cache for whenry_49094902fea7938f.propaganda.hc to the ip address 172.17.152.149 instead of 172.17.152.146 The attack was successful in a contained environment of VM's on the UGA network DNS transaction id was unknown. Scapy is used for sppofing packets The attack is fully automated via script.sh since the cache TTL of a result from the resolver to authority server is 60 s. Upon successful poisoning, a HTTP get request is sent to the compromised server also located on 172.17.152.149
About
Project for a Computer Security class based on CSAW capture the flag challenges
Resources
Stars
Watchers
Forks
Releases
No releases published
Packages 0
No packages published