View Issue Details

IDProjectCategoryView StatusLast Update
0002443Kali LinuxNew Tool Requestspublic2020-03-30 14:37
ReporterMister_X Assigned To 
PrioritynormalSeverityfeatureReproducibilityN/A
Status closedResolutionwon't fix 
Summary0002443: dns2proxy
Description

Offensive DNS server.

Features:
Traditional DNS Spoof adding to the response the original IP address.
Attack of DNS spoofing adding 2 IP address at the top of the resolution and configuring the system to forward the connections.
Automatically the dns server detects and correct the changes thats my sslstrip+ do to the hostnames to avoid HSTS, so will response properly.

Additional Information

URL: https://github.com/LeonardoNve/dns2proxy

Activities

g0tmi1k

g0tmi1k

2018-01-29 14:51

administrator   ~0008383

To help speed up the process of evaluating the tool, please make sure to include the following information (the more information you include, the more beneficial it will for us):

  • [Name] - The name of the tool
  • [Version] - What version of the tool should be added?
    --- If it uses source control (such as git), please make sure there is a release to match (e.g. git tag)
  • [Homepage] - Where can the tool be found online? Where to go to get more information?
  • [Download] - Where to go to get the tool?
  • [Author] - Who made the tool?
  • [Licence] - How is the software distributed? What conditions does it come with?
  • [Description] - What is the tool about? What does it do?
  • [Dependencies] - What is needed for the tool to work?
  • [Similar tools] - What other tools are out there?
  • [How to install] - How do you compile it?
  • [How to use] - What are some basic commands/functions to demonstrate it?
Mister_X

Mister_X

2018-02-01 02:04

reporter   ~0008596

  • [Name] - dns2proxy
  • [Version] - current master
  • [Homepage] - https://github.com/LeonardoNve/dns2proxy
  • [Download] - https://github.com/LeonardoNve/dns2proxy
  • [Author] - Leonardo Nve ( [email protected])
  • [Licence] - None
  • [Description] - Offensive DNS server. Traditional DNS Spoof adding to the response the original IP address. Attack of DNS spoofing adding 2 IP address at the top of the resolution and configuring the system to forward the connections.
    Automatically the dns server detects and correct the changes thats my sslstrip+ do to the hostnames to avoid HSTS, so will response properly.
  • [Dependencies] - Python 2.6 and dnspython
  • [Similar tools] - Haven't researched
  • [How to install] - Runs from its own directory
  • [How to use] - Example:
    python2.6 dns2proxy.py -i eth0 -u 192.168.1.101 -d 192.168.1.200
    Example for no forwarding (only configured domain based queries and spoofed hosts):
    python2.6 dns2proxy.py -i eth0 -noforward
    Example for no forwarding but add IPs
    python dns2proxy.py -i eth0 -I 192.168.1.101,90.1.1.1,155.54.1.1 -noforward

Other examples provided on GitHub in README.md

g0tmi1k

g0tmi1k

2020-03-30 14:37

administrator   ~0012566

Python 2.x - which is EOL

Issue History

Date Modified Username Field Change
2015-07-24 00:42 Mister_X New Issue
2018-01-29 10:22 g0tmi1k Summary Add dns2proxy => dns2proxy
2018-01-29 14:51 g0tmi1k Note Added: 0008383
2018-02-01 02:04 Mister_X Note Added: 0008596
2018-02-21 09:35 g0tmi1k Product Version 1.1.0 =>
2019-12-09 13:30 g0tmi1k Severity minor => feature
2020-03-30 14:37 g0tmi1k Status new => closed
2020-03-30 14:37 g0tmi1k Resolution open => won't fix
2020-03-30 14:37 g0tmi1k Note Added: 0012566