Skip to content

Project for a Computer Security class based on CSAW capture the flag challenges

Notifications You must be signed in to change notification settings

mistahenry/DNS-Cache-Poisoning-with-Scapy

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

1 Commit
 
 
 
 
 
 

Repository files navigation

DNS Cache Poisoning attack against a resolver at 172.17.152.150 and DNS auth server at 172.17.152.149
Trying to set the cache for whenry_49094902fea7938f.propaganda.hc to the ip address 172.17.152.149
instead of 172.17.152.146

The attack was successful in a contained environment of VM's on the UGA network

DNS transaction id was unknown. Scapy is used for sppofing packets

The attack is fully automated via script.sh since the cache TTL of a result from the resolver to authority
server is 60 s. Upon successful poisoning, a HTTP get request is sent to the compromised server also
located on 172.17.152.149

About

Project for a Computer Security class based on CSAW capture the flag challenges

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published