module

Native DNS Spoofer (Example)

Disclosed
N/A
Created
Jun 14, 2018

Description

This module provides a Rex based DNS service to resolve queries intercepted
via the capture mixin. Configure STATIC_ENTRIES to contain host-name mappings
desired for spoofing using a hostsfile or space/semicolon separated entries.
In the default configuration, the service operates as a normal native DNS server
with the exception of consuming from and writing to the wire as opposed to a
listening socket. Best when compromising routers or spoofing L2 in order to
prevent return of the real reply which causes a race condition. The method
by which replies are filtered is up to the user (though iptables works fine).

Author

RageLtMan rageltman@sempervictus

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':


msf > use auxiliary/spoof/dns/native_spoofer
msf auxiliary(native_spoofer) > show actions
...actions...
msf auxiliary(native_spoofer) > set ACTION < action-name >
msf auxiliary(native_spoofer) > show options
...show and set options...
msf auxiliary(native_spoofer) > run

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.