Last updated at Wed, 26 Jul 2017 16:32:54 GMT

After seeing the SBC/ATT server for Austin get poisoned, serve up advertisements, and eventually get taken offline, I decided to add a module to compare DNS results between two servers. In the following example, the ".gov" TLD has been poisoned with the bailiwicked_domain Metasploit module:

msf > use auxiliary/spoof/dns/compare_results

msf auxiliary(compare_results) > set BASEDNS 4.2.2.3
BASEDNS => 4.2.2.3

msf auxiliary(compare_results) > set TARGDNS poisoned.server
TARDNS => poisoned.server

msf auxiliary(compare_results) > set NAMES www.fbi.gov
NAMES => www.fbi.gov

msf auxiliary(compare_results) > run
[*] Comparing results between 4.2.2.3 and poisoned.server...
[*] Querying servers for www.fbi.gov...
[*] Analyzing results for 1 entries...
[*]   - www.fbi.gov A 64.86.183.120
[*]   - www.fbi.gov A 64.86.183.99
[*]   - www.fbi.gov CNAME a33.g.akamai.net
[*]   - www.fbi.gov CNAME fbi.edgesuite.net
[*]   www.fbi.gov A 1.3.3.7
[*] Auxiliary module execution completed