View Issue Details
|ID||Project||Category||View Status||Date Submitted||Last Update|
|0007347||Kali Linux||[All Projects] New Tool Requests||public||2021-09-28 09:03||2021-11-07 12:38|
|Target Version||Fixed in Version|
|Summary||0007347: deserter - a targeted DNS cache poisoner|
Description: deserter is a targeted DNS cache poisoner capable of DNS cache poisoning without brute forcing the target ID and source port.
Dependencies: The tool relies on PcapPlusPlus and argparse (both are statically linked into the final binary, so there shouldn't be any problems).
Similar tools: dnsspoof.py (https://github.com/DanMcInerney/dnsspoof)
Activity: Development began on 20.09.2021. Support for DNS over IPv6 is also coming.
How to install: https://github.com/b4ckslash0/deserter/releases/tag/v1.0 - instructions for manual compilation are also available on the GitHub page.
How to use:
-h --help shows help message and exits
-v --version prints version information and exits
-t --target IP Address of the machine whose cache to poison [required]
-i --interface Network Interface to use (takes an IP address or a name [required]
-b --bad-ip IP Address to inject into the cache. This shold be the address of the server you want to redirect the victim to [required]
--bad-ipv6 IPv6 Address to inject into the cache. This shold be the address of the server you want to redirect the victim to
--ttl The time-to-live of the poisoned DNS record (specified in seconds). Defaults to 300s or 5min. [default: 300]
-d --domains Specific domains to poison - enter them in a comma-separated list without spaces
-k --keep-alive Used to tell deserter that it should keep waiting for more probes even after a successful poisoning. [default: false]
Packaged: .deb package is available on https://github.com/b4ckslash0/deserter/releases/tag/v1.0