├── docs ├── html │ ├── graph_legend.md5 │ ├── inherit_graph_0.md5 │ ├── inherit_graph_1.md5 │ ├── inherit_graph_2.md5 │ ├── inherit_graph_3.md5 │ ├── bc_s.png │ ├── bdwn.png │ ├── classdns__attack_1_1DNSAttack_1_1Mode__coll__graph.md5 │ ├── classdns__attack_1_1InitialQueryFailed__coll__graph.md5 │ ├── doc.png │ ├── open.png │ ├── classdns__attack_1_1DNSAttack_1_1Mode__inherit__graph.md5 │ ├── classdns__attack_1_1InitialQueryFailed__inherit__graph.md5 │ ├── closed.png │ ├── nav_f.png │ ├── nav_g.png │ ├── nav_h.png │ ├── tab_a.png │ ├── tab_b.png │ ├── tab_h.png │ ├── tab_s.png │ ├── classdns__attack_1_1DNSAttack_1_1CriticalError__coll__graph.md5 │ ├── classdns__attack_1_1DNSAttack_1_1CriticalError__inherit__graph.md5 │ ├── classdns__attack_1_1DNSAttack_1_1InvalidIPAddress__coll__graph.md5 │ ├── classdns__attack_1_1DNSAttack_1_1NSFetchError__coll__graph.md5 │ ├── classdns__attack_1_1DNSAttack_1_1NSFetchError__inherit__graph.md5 │ ├── classdns__attack_1_1DNSAttack_1_1SuccessfulAttack__coll__graph.md5 │ ├── classdns__poisoning_1_1DNSPoisoning_1_1AttackType__coll__graph.md5 │ ├── classdns__poisoning_1_1DNSPoisoning_1_1InvalidMAC__coll__graph.md5 │ ├── classhomework_1_1DNSAttack_1_1InitialQueryFailed__coll__graph.md5 │ ├── doxygen.png │ ├── splitbar.png │ ├── sync_off.png │ ├── sync_on.png │ ├── classdns__attack_1_1DNSAttack_1_1InitialQueryFailed__coll__graph.md5 │ ├── classdns__attack_1_1DNSAttack_1_1InitialQueryFailed__inherit__graph.md5 │ ├── classdns__attack_1_1DNSAttack_1_1InvalidAttackType__coll__graph.md5 │ ├── classdns__attack_1_1DNSAttack_1_1InvalidAttackType__inherit__graph.md5 │ ├── classdns__attack_1_1DNSAttack_1_1InvalidIPAddress__inherit__graph.md5 │ ├── classdns__attack_1_1DNSAttack_1_1SuccessfulAttack__inherit__graph.md5 │ ├── classdns__poisoning_1_1DNSPoisoning_1_1AttackType__inherit__graph.md5 │ ├── classdns__poisoning_1_1DNSPoisoning_1_1InvalidMAC__inherit__graph.md5 │ ├── classhomework_1_1DNSAttack_1_1InitialQueryFailed__inherit__graph.md5 │ ├── folderopen.png │ ├── folderclosed.png │ ├── graph_legend.png │ ├── search │ │ ├── close.png │ │ ├── mag_sel.png │ │ ├── pages_0.js │ │ ├── pages_1.js │ │ ├── namespaces_1.js │ │ ├── search_l.png │ │ ├── search_m.png │ │ ├── search_r.png │ │ ├── namespaces_0.js │ │ ├── classes_4.js │ │ ├── classes_5.js │ │ ├── classes_0.js │ │ ├── classes_1.js │ │ ├── classes_6.js │ │ ├── variables_9.js │ │ ├── variables_3.js │ │ ├── all_b.js │ │ ├── all_c.js │ │ ├── all_9.js │ │ ├── functions_4.js │ │ ├── variables_7.js │ │ ├── functions_2.js │ │ ├── variables_4.js │ │ ├── all_e.js │ │ ├── classes_2.js │ │ ├── all_8.js │ │ ├── variables_5.js │ │ ├── all_0.js │ │ ├── functions_0.js │ │ ├── all_f.js │ │ ├── variables_2.js │ │ ├── all_5.js │ │ ├── variables_a.js │ │ ├── functions_1.js │ │ ├── all_2.js │ │ ├── all_3.js │ │ ├── variables_1.js │ │ ├── nomatches.html │ │ ├── searchdata.js │ │ ├── classes_3.js │ │ ├── all_4.js │ │ ├── variables_6.js │ │ ├── all_6.js │ │ ├── functions_3.js │ │ ├── all_a.js │ │ ├── all_7.js │ │ ├── variables_0.js │ │ ├── variables_8.js │ │ ├── all_1.js │ │ ├── all_0.html │ │ ├── all_1.html │ │ ├── all_2.html │ │ ├── all_3.html │ │ ├── all_4.html │ │ ├── all_5.html │ │ ├── all_6.html │ │ ├── all_7.html │ │ ├── all_8.html │ │ ├── all_9.html │ │ ├── all_a.html │ │ ├── all_b.html │ │ ├── all_c.html │ │ ├── all_d.html │ │ ├── all_e.html │ │ ├── all_f.html │ │ ├── pages_0.html │ │ ├── pages_1.html │ │ ├── classes_0.html │ │ ├── classes_1.html │ │ ├── classes_2.html │ │ ├── classes_3.html │ │ ├── classes_4.html │ │ ├── classes_5.html │ │ ├── classes_6.html │ │ ├── functions_0.html │ │ ├── functions_1.html │ │ ├── functions_2.html │ │ ├── functions_3.html │ │ ├── functions_4.html │ │ ├── functions_5.html │ │ ├── variables_0.html │ │ ├── variables_1.html │ │ ├── variables_2.html │ │ ├── variables_3.html │ │ ├── variables_4.html │ │ ├── variables_5.html │ │ ├── variables_6.html │ │ ├── variables_7.html │ │ ├── variables_8.html │ │ ├── variables_9.html │ │ ├── variables_a.html │ │ ├── namespaces_0.html │ │ ├── namespaces_1.html │ │ ├── functions_5.js │ │ └── all_d.js │ ├── inherit_graph_0.png │ ├── inherit_graph_1.png │ ├── inherit_graph_2.png │ ├── inherit_graph_3.png │ ├── classdns__attack_1_1DNSAttack_1_1Mode__coll__graph.map │ ├── classdns__attack_1_1DNSAttack_1_1Mode__inherit__graph.map │ ├── classdns__attack_1_1InitialQueryFailed__coll__graph.map │ ├── classdns__attack_1_1InitialQueryFailed__inherit__graph.map │ ├── classdns__attack_1_1DNSAttack_1_1CriticalError__coll__graph.map │ ├── classdns__attack_1_1DNSAttack_1_1SuccessfulAttack__coll__graph.map │ ├── classdns__attack_1_1DNSAttack_1_1SuccessfulAttack__inherit__graph.map │ ├── classdns__poisoning_1_1DNSPoisoning_1_1AttackType__coll__graph.map │ ├── classdns__poisoning_1_1DNSPoisoning_1_1AttackType__inherit__graph.map │ ├── classdns__poisoning_1_1DNSPoisoning_1_1InvalidMAC__coll__graph.map │ ├── classdns__poisoning_1_1DNSPoisoning_1_1InvalidMAC__inherit__graph.map │ ├── classhomework_1_1DNSAttack_1_1InitialQueryFailed__coll__graph.map │ ├── classhomework_1_1DNSAttack_1_1InitialQueryFailed__inherit__graph.map │ ├── classdns__attack_1_1DNSAttack_1_1Mode__coll__graph.png │ ├── classdns__attack_1_1InitialQueryFailed__coll__graph.png │ ├── classdns__attack_1_1DNSAttack_1_1Mode__inherit__graph.png │ ├── classdns__attack_1_1InitialQueryFailed__inherit__graph.png │ ├── classdns__attack_1_1DNSAttack_1_1CriticalError__coll__graph.png │ ├── classdns__attack_1_1DNSAttack_1_1NSFetchError__coll__graph.png │ ├── classdns__attack_1_1DNSAttack_1_1NSFetchError__inherit__graph.png │ ├── classhomework_1_1DNSAttack_1_1InitialQueryFailed__coll__graph.png │ ├── classdns__attack_1_1DNSAttack_1_1CriticalError__inherit__graph.png │ ├── classdns__attack_1_1DNSAttack_1_1InitialQueryFailed__coll__graph.png │ ├── classdns__attack_1_1DNSAttack_1_1InvalidAttackType__coll__graph.png │ ├── classdns__attack_1_1DNSAttack_1_1InvalidIPAddress__coll__graph.png │ ├── classdns__attack_1_1DNSAttack_1_1SuccessfulAttack__coll__graph.png │ ├── classdns__poisoning_1_1DNSPoisoning_1_1AttackType__coll__graph.png │ ├── classdns__poisoning_1_1DNSPoisoning_1_1InvalidMAC__coll__graph.png │ ├── classhomework_1_1DNSAttack_1_1InitialQueryFailed__inherit__graph.png │ ├── classdns__attack_1_1DNSAttack_1_1InvalidAttackType__inherit__graph.png │ ├── classdns__attack_1_1DNSAttack_1_1InvalidIPAddress__inherit__graph.png │ ├── classdns__attack_1_1DNSAttack_1_1SuccessfulAttack__inherit__graph.png │ ├── classdns__poisoning_1_1DNSPoisoning_1_1AttackType__inherit__graph.png │ ├── classdns__poisoning_1_1DNSPoisoning_1_1InvalidMAC__inherit__graph.png │ ├── classdns__attack_1_1DNSAttack_1_1InitialQueryFailed__inherit__graph.png │ ├── inherit_graph_0.map │ ├── inherit_graph_3.map │ ├── classdns__attack_1_1DNSAttack_1_1NSFetchError__coll__graph.map │ ├── classdns__attack_1_1DNSAttack_1_1NSFetchError__inherit__graph.map │ ├── classdns__attack_1_1DNSAttack_1_1InvalidIPAddress__coll__graph.map │ ├── classdns__attack_1_1DNSAttack_1_1InvalidAttackType__coll__graph.map │ ├── classdns__attack_1_1DNSAttack_1_1InvalidIPAddress__inherit__graph.map │ ├── classdns__attack_1_1DNSAttack_1_1InitialQueryFailed__coll__graph.map │ ├── classdns__attack_1_1DNSAttack_1_1InitialQueryFailed__inherit__graph.map │ ├── classdns__attack_1_1DNSAttack_1_1InvalidAttackType__inherit__graph.map │ ├── inherit_graph_2.map │ ├── classdns__attack_1_1DNSAttack_1_1CriticalError__inherit__graph.map │ ├── menudata.js │ ├── inherit_graph_1.map │ ├── menu.js │ ├── Mainpage.html │ ├── index.html │ ├── bug.html │ ├── pages.html │ ├── namespaceDNS__Attack.html │ ├── namespaceMain.html │ ├── dynsections.js │ ├── todo.html │ ├── namespaces.html │ ├── namespaceDNS__Poisoning.html │ ├── classdns__attack_1_1DNSAttack_1_1Mode-members.html │ ├── classdns__poisoning_1_1DNSPoisoning_1_1AttackType-members.html │ ├── classdns__attack_1_1DNSAttack_1_1SuccessfulAttack.html │ ├── classdns__poisoning_1_1DNSPoisoning_1_1InvalidMAC.html │ ├── classdns__attack_1_1InitialQueryFailed.html │ ├── classhomework_1_1DNSAttack_1_1InitialQueryFailed.html │ ├── classdns__attack_1_1DNSAttack_1_1NSFetchError.html │ ├── classdns__attack_1_1DNSAttack_1_1InitialQueryFailed.html │ ├── classdns__attack_1_1DNSAttack_1_1InvalidAttackType.html │ ├── classdns__attack_1_1DNSAttack_1_1InvalidIPAddress.html │ └── classdns__attack_1_1DNSAttack_1_1CriticalError.html ├── latex │ ├── classdns__attack_1_1InitialQueryFailed__coll__graph.md5 │ ├── classdns__attack_1_1InitialQueryFailed__inherit__graph.md5 │ ├── classdns__attack_1_1InitialQueryFailed__coll__graph.pdf │ ├── classdns__attack_1_1InitialQueryFailed__inherit__graph.pdf │ ├── namespaceDNS__Poisoning.tex │ ├── namespaceDNS__Attack.tex │ ├── hierarchy.tex │ ├── annotated.tex │ ├── namespaces.tex │ ├── Makefile │ ├── classdns__attack_1_1InitialQueryFailed.tex │ ├── classdns__poisoning_1_1DNSPoisoning.tex │ └── refman.tex ├── dnspoisoning_screen.png ├── dnspoisoning_screen_2.png └── index.html ├── .vscode └── settings.json ├── requirements.txt ├── .gitignore ├── launch.sh ├── launch_fast.sh └── README.md /docs/html/graph_legend.md5: -------------------------------------------------------------------------------- 1 | 387ff8eb65306fa251338d3c9bd7bfff -------------------------------------------------------------------------------- /docs/html/inherit_graph_0.md5: -------------------------------------------------------------------------------- 1 | 59601f1bd7aa064255e4846ff81c178e -------------------------------------------------------------------------------- /docs/html/inherit_graph_1.md5: -------------------------------------------------------------------------------- 1 | 8fdbc3419256376106ca3d756b5e2b54 -------------------------------------------------------------------------------- /docs/html/inherit_graph_2.md5: -------------------------------------------------------------------------------- 1 | ee0a890eb004b5e8cb39f782571f41cd -------------------------------------------------------------------------------- /docs/html/inherit_graph_3.md5: -------------------------------------------------------------------------------- 1 | 113002020ba0149f37602ab7559ce7cb -------------------------------------------------------------------------------- /.vscode/settings.json: -------------------------------------------------------------------------------- 1 | { 2 | "python.pythonPath": "/usr/bin/python3" 3 | } -------------------------------------------------------------------------------- /requirements.txt: -------------------------------------------------------------------------------- 1 | scapy==2.4.2 2 | blessings==1.7 3 | dnspython==1.16.0 4 | -------------------------------------------------------------------------------- /docs/html/bc_s.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/html/bc_s.png -------------------------------------------------------------------------------- /docs/html/bdwn.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/html/bdwn.png -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1DNSAttack_1_1Mode__coll__graph.md5: -------------------------------------------------------------------------------- 1 | 19c9e5c5c6a292ad078a0bff451ff69a -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1InitialQueryFailed__coll__graph.md5: -------------------------------------------------------------------------------- 1 | 6270b6d8d5f9a9d4398c5eebeca8099e -------------------------------------------------------------------------------- /docs/html/doc.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/html/doc.png -------------------------------------------------------------------------------- /docs/html/open.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/html/open.png -------------------------------------------------------------------------------- /docs/latex/classdns__attack_1_1InitialQueryFailed__coll__graph.md5: -------------------------------------------------------------------------------- 1 | ac1e38fba12c640849f6a64209184897 -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1DNSAttack_1_1Mode__inherit__graph.md5: -------------------------------------------------------------------------------- 1 | e71619ea925c168eed9010db09e3d9fa -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1InitialQueryFailed__inherit__graph.md5: -------------------------------------------------------------------------------- 1 | 6c5d308222d42d326716059fab10edf3 -------------------------------------------------------------------------------- /docs/html/closed.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/html/closed.png -------------------------------------------------------------------------------- /docs/html/nav_f.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/html/nav_f.png -------------------------------------------------------------------------------- /docs/html/nav_g.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/html/nav_g.png -------------------------------------------------------------------------------- /docs/html/nav_h.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/html/nav_h.png -------------------------------------------------------------------------------- /docs/html/tab_a.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/html/tab_a.png -------------------------------------------------------------------------------- /docs/html/tab_b.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/html/tab_b.png -------------------------------------------------------------------------------- /docs/html/tab_h.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/html/tab_h.png -------------------------------------------------------------------------------- /docs/html/tab_s.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/html/tab_s.png -------------------------------------------------------------------------------- /docs/latex/classdns__attack_1_1InitialQueryFailed__inherit__graph.md5: -------------------------------------------------------------------------------- 1 | e51507658e77450c2051a87b06ada1ab -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1DNSAttack_1_1CriticalError__coll__graph.md5: -------------------------------------------------------------------------------- 1 | cea2badcfa8808573a2ad880d1fb0ea9 -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1DNSAttack_1_1CriticalError__inherit__graph.md5: -------------------------------------------------------------------------------- 1 | fc83a532c19e7a64fc5110873d70e584 -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1DNSAttack_1_1InvalidIPAddress__coll__graph.md5: -------------------------------------------------------------------------------- 1 | 05d00d38d383c0ba688b09cba1f32f24 -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1DNSAttack_1_1NSFetchError__coll__graph.md5: -------------------------------------------------------------------------------- 1 | 13583a9112f0063f501ee1166132050d -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1DNSAttack_1_1NSFetchError__inherit__graph.md5: -------------------------------------------------------------------------------- 1 | 86e50d437c2911ad2d1a15e599c53d41 -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1DNSAttack_1_1SuccessfulAttack__coll__graph.md5: -------------------------------------------------------------------------------- 1 | cf44287b494f67f52751ab34baffd761 -------------------------------------------------------------------------------- /docs/html/classdns__poisoning_1_1DNSPoisoning_1_1AttackType__coll__graph.md5: -------------------------------------------------------------------------------- 1 | 0b8ebf897a4279bccb5b1f0aee015494 -------------------------------------------------------------------------------- /docs/html/classdns__poisoning_1_1DNSPoisoning_1_1InvalidMAC__coll__graph.md5: -------------------------------------------------------------------------------- 1 | 119c61205134513615fc6b02b41fe09b -------------------------------------------------------------------------------- /docs/html/classhomework_1_1DNSAttack_1_1InitialQueryFailed__coll__graph.md5: -------------------------------------------------------------------------------- 1 | 367ca1cfa56fdf7328d9df64fc309295 -------------------------------------------------------------------------------- /docs/html/doxygen.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/html/doxygen.png -------------------------------------------------------------------------------- /docs/html/splitbar.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/html/splitbar.png -------------------------------------------------------------------------------- /docs/html/sync_off.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/html/sync_off.png -------------------------------------------------------------------------------- /docs/html/sync_on.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/html/sync_on.png -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1DNSAttack_1_1InitialQueryFailed__coll__graph.md5: -------------------------------------------------------------------------------- 1 | d84555c8e7fac6c2d0bad54fd56a76be -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1DNSAttack_1_1InitialQueryFailed__inherit__graph.md5: -------------------------------------------------------------------------------- 1 | 9fcd168da2153945be736adba92f0c15 -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1DNSAttack_1_1InvalidAttackType__coll__graph.md5: -------------------------------------------------------------------------------- 1 | d2c4d53a3c18b0f872c3120a85cf59c5 -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1DNSAttack_1_1InvalidAttackType__inherit__graph.md5: -------------------------------------------------------------------------------- 1 | bcfecc5ca69ed9555b4120c265dbebfa -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1DNSAttack_1_1InvalidIPAddress__inherit__graph.md5: -------------------------------------------------------------------------------- 1 | c07658c04fff97eb0e7701fee778b40f -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1DNSAttack_1_1SuccessfulAttack__inherit__graph.md5: -------------------------------------------------------------------------------- 1 | 23c915c9fba717a7c28366f7abe52eba -------------------------------------------------------------------------------- /docs/html/classdns__poisoning_1_1DNSPoisoning_1_1AttackType__inherit__graph.md5: -------------------------------------------------------------------------------- 1 | 889cb106fe69091a6a63647335375a58 -------------------------------------------------------------------------------- /docs/html/classdns__poisoning_1_1DNSPoisoning_1_1InvalidMAC__inherit__graph.md5: -------------------------------------------------------------------------------- 1 | 25510dd7cfa164912aa4dc318bb2c8c3 -------------------------------------------------------------------------------- /docs/html/classhomework_1_1DNSAttack_1_1InitialQueryFailed__inherit__graph.md5: -------------------------------------------------------------------------------- 1 | ff395e11e447b18432222bce7f2b8283 -------------------------------------------------------------------------------- /docs/html/folderopen.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/html/folderopen.png -------------------------------------------------------------------------------- /docs/dnspoisoning_screen.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/dnspoisoning_screen.png -------------------------------------------------------------------------------- /docs/html/folderclosed.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/html/folderclosed.png -------------------------------------------------------------------------------- /docs/html/graph_legend.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/html/graph_legend.png -------------------------------------------------------------------------------- /docs/html/search/close.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/html/search/close.png -------------------------------------------------------------------------------- /docs/html/search/mag_sel.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/html/search/mag_sel.png -------------------------------------------------------------------------------- /docs/html/search/pages_0.js: -------------------------------------------------------------------------------- 1 | var searchData= 2 | [ 3 | ['todo_20list',['Todo List',['../todo.html',1,'']]] 4 | ]; 5 | -------------------------------------------------------------------------------- /docs/html/search/pages_1.js: -------------------------------------------------------------------------------- 1 | var searchData= 2 | [ 3 | ['todo_20list',['Todo List',['../todo.html',1,'']]] 4 | ]; 5 | -------------------------------------------------------------------------------- /docs/dnspoisoning_screen_2.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/dnspoisoning_screen_2.png -------------------------------------------------------------------------------- /docs/html/inherit_graph_0.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/html/inherit_graph_0.png -------------------------------------------------------------------------------- /docs/html/inherit_graph_1.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/html/inherit_graph_1.png -------------------------------------------------------------------------------- /docs/html/inherit_graph_2.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/html/inherit_graph_2.png -------------------------------------------------------------------------------- /docs/html/inherit_graph_3.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/html/inherit_graph_3.png -------------------------------------------------------------------------------- /docs/html/search/namespaces_1.js: -------------------------------------------------------------------------------- 1 | var searchData= 2 | [ 3 | ['main',['Main',['../namespaceMain.html',1,'']]] 4 | ]; 5 | -------------------------------------------------------------------------------- /docs/html/search/search_l.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/html/search/search_l.png -------------------------------------------------------------------------------- /docs/html/search/search_m.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/html/search/search_m.png -------------------------------------------------------------------------------- /docs/html/search/search_r.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/html/search/search_r.png -------------------------------------------------------------------------------- /docs/index.html: -------------------------------------------------------------------------------- 1 | -------------------------------------------------------------------------------- /.gitignore: -------------------------------------------------------------------------------- 1 | 2 | __pycache__/ 3 | .vscode/ 4 | share/ 5 | lib/ 6 | lib64/ 7 | pyvenc.cfg 8 | include/ 9 | bin/ 10 | .gitignore 11 | -------------------------------------------------------------------------------- /docs/html/search/namespaces_0.js: -------------------------------------------------------------------------------- 1 | var searchData= 2 | [ 3 | ['dns_5fattack',['DNS_Attack',['../namespaceDNS__Attack.html',1,'']]] 4 | ]; 5 | -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1DNSAttack_1_1Mode__coll__graph.map: -------------------------------------------------------------------------------- 1 | 3 | -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1DNSAttack_1_1Mode__inherit__graph.map: -------------------------------------------------------------------------------- 1 | 3 | -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1InitialQueryFailed__coll__graph.map: -------------------------------------------------------------------------------- 1 | 3 | -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1InitialQueryFailed__inherit__graph.map: -------------------------------------------------------------------------------- 1 | 3 | -------------------------------------------------------------------------------- /docs/html/search/classes_4.js: -------------------------------------------------------------------------------- 1 | var searchData= 2 | [ 3 | ['mode',['Mode',['../classdns__attack_1_1DNSAttack_1_1Mode.html',1,'dns_attack::DNSAttack']]] 4 | ]; 5 | -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1DNSAttack_1_1CriticalError__coll__graph.map: -------------------------------------------------------------------------------- 1 | 3 | -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1DNSAttack_1_1SuccessfulAttack__coll__graph.map: -------------------------------------------------------------------------------- 1 | 3 | -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1DNSAttack_1_1SuccessfulAttack__inherit__graph.map: -------------------------------------------------------------------------------- 1 | 3 | -------------------------------------------------------------------------------- /docs/html/classdns__poisoning_1_1DNSPoisoning_1_1AttackType__coll__graph.map: -------------------------------------------------------------------------------- 1 | 3 | -------------------------------------------------------------------------------- /docs/html/classdns__poisoning_1_1DNSPoisoning_1_1AttackType__inherit__graph.map: -------------------------------------------------------------------------------- 1 | 3 | -------------------------------------------------------------------------------- /docs/html/classdns__poisoning_1_1DNSPoisoning_1_1InvalidMAC__coll__graph.map: -------------------------------------------------------------------------------- 1 | 3 | -------------------------------------------------------------------------------- /docs/html/classdns__poisoning_1_1DNSPoisoning_1_1InvalidMAC__inherit__graph.map: -------------------------------------------------------------------------------- 1 | 3 | -------------------------------------------------------------------------------- /docs/html/classhomework_1_1DNSAttack_1_1InitialQueryFailed__coll__graph.map: -------------------------------------------------------------------------------- 1 | 3 | -------------------------------------------------------------------------------- /docs/html/classhomework_1_1DNSAttack_1_1InitialQueryFailed__inherit__graph.map: -------------------------------------------------------------------------------- 1 | 3 | -------------------------------------------------------------------------------- /docs/html/search/classes_5.js: -------------------------------------------------------------------------------- 1 | var searchData= 2 | [ 3 | ['nsfetcherror',['NSFetchError',['../classdns__attack_1_1DNSAttack_1_1NSFetchError.html',1,'dns_attack::DNSAttack']]] 4 | ]; 5 | -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1DNSAttack_1_1Mode__coll__graph.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/html/classdns__attack_1_1DNSAttack_1_1Mode__coll__graph.png -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1InitialQueryFailed__coll__graph.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/html/classdns__attack_1_1InitialQueryFailed__coll__graph.png -------------------------------------------------------------------------------- /docs/html/search/classes_0.js: -------------------------------------------------------------------------------- 1 | var searchData= 2 | [ 3 | ['attacktype',['AttackType',['../classdns__poisoning_1_1DNSPoisoning_1_1AttackType.html',1,'dns_poisoning::DNSPoisoning']]] 4 | ]; 5 | -------------------------------------------------------------------------------- /docs/html/search/classes_1.js: -------------------------------------------------------------------------------- 1 | var searchData= 2 | [ 3 | ['criticalerror',['CriticalError',['../classdns__attack_1_1DNSAttack_1_1CriticalError.html',1,'dns_attack::DNSAttack']]] 4 | ]; 5 | -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1DNSAttack_1_1Mode__inherit__graph.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/html/classdns__attack_1_1DNSAttack_1_1Mode__inherit__graph.png -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1InitialQueryFailed__inherit__graph.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/html/classdns__attack_1_1InitialQueryFailed__inherit__graph.png -------------------------------------------------------------------------------- /docs/html/search/classes_6.js: -------------------------------------------------------------------------------- 1 | var searchData= 2 | [ 3 | ['successfulattack',['SuccessfulAttack',['../classdns__attack_1_1DNSAttack_1_1SuccessfulAttack.html',1,'dns_attack::DNSAttack']]] 4 | ]; 5 | -------------------------------------------------------------------------------- /docs/latex/classdns__attack_1_1InitialQueryFailed__coll__graph.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/latex/classdns__attack_1_1InitialQueryFailed__coll__graph.pdf -------------------------------------------------------------------------------- /docs/html/search/variables_9.js: -------------------------------------------------------------------------------- 1 | var searchData= 2 | [ 3 | ['ttl',['ttl',['../classdns__poisoning_1_1DNSPoisoning.html#a3d11bc7dacd26234e0dab3a2369d7711',1,'dns_poisoning::DNSPoisoning']]] 4 | ]; 5 | -------------------------------------------------------------------------------- /docs/latex/classdns__attack_1_1InitialQueryFailed__inherit__graph.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/latex/classdns__attack_1_1InitialQueryFailed__inherit__graph.pdf -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1DNSAttack_1_1CriticalError__coll__graph.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/html/classdns__attack_1_1DNSAttack_1_1CriticalError__coll__graph.png -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1DNSAttack_1_1NSFetchError__coll__graph.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/html/classdns__attack_1_1DNSAttack_1_1NSFetchError__coll__graph.png -------------------------------------------------------------------------------- /docs/html/search/variables_3.js: -------------------------------------------------------------------------------- 1 | var searchData= 2 | [ 3 | ['fast',['FAST',['../classdns__attack_1_1DNSAttack_1_1Mode.html#a7de52c622511a5fd41e3682ada3ace0c',1,'dns_attack::DNSAttack::Mode']]] 4 | ]; 5 | -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1DNSAttack_1_1NSFetchError__inherit__graph.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/html/classdns__attack_1_1DNSAttack_1_1NSFetchError__inherit__graph.png -------------------------------------------------------------------------------- /docs/html/classhomework_1_1DNSAttack_1_1InitialQueryFailed__coll__graph.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/html/classhomework_1_1DNSAttack_1_1InitialQueryFailed__coll__graph.png -------------------------------------------------------------------------------- /docs/html/search/all_b.js: -------------------------------------------------------------------------------- 1 | var searchData= 2 | [ 3 | ['open_5fsocket',['open_socket',['../classdns__poisoning_1_1DNSPoisoning.html#abd71b87190582b47006ea5f44554766a',1,'dns_poisoning::DNSPoisoning']]] 4 | ]; 5 | -------------------------------------------------------------------------------- /docs/html/search/all_c.js: -------------------------------------------------------------------------------- 1 | var searchData= 2 | [ 3 | ['random_5furl',['random_url',['../classdns__poisoning_1_1DNSPoisoning.html#a644377ab26bf8c1a546fa45988edffaa',1,'dns_poisoning::DNSPoisoning']]] 4 | ]; 5 | -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1DNSAttack_1_1CriticalError__inherit__graph.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/html/classdns__attack_1_1DNSAttack_1_1CriticalError__inherit__graph.png -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1DNSAttack_1_1InitialQueryFailed__coll__graph.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/html/classdns__attack_1_1DNSAttack_1_1InitialQueryFailed__coll__graph.png -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1DNSAttack_1_1InvalidAttackType__coll__graph.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/html/classdns__attack_1_1DNSAttack_1_1InvalidAttackType__coll__graph.png -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1DNSAttack_1_1InvalidIPAddress__coll__graph.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/html/classdns__attack_1_1DNSAttack_1_1InvalidIPAddress__coll__graph.png -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1DNSAttack_1_1SuccessfulAttack__coll__graph.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/html/classdns__attack_1_1DNSAttack_1_1SuccessfulAttack__coll__graph.png -------------------------------------------------------------------------------- /docs/html/classdns__poisoning_1_1DNSPoisoning_1_1AttackType__coll__graph.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/html/classdns__poisoning_1_1DNSPoisoning_1_1AttackType__coll__graph.png -------------------------------------------------------------------------------- /docs/html/classdns__poisoning_1_1DNSPoisoning_1_1InvalidMAC__coll__graph.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/html/classdns__poisoning_1_1DNSPoisoning_1_1InvalidMAC__coll__graph.png -------------------------------------------------------------------------------- /docs/html/classhomework_1_1DNSAttack_1_1InitialQueryFailed__inherit__graph.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/html/classhomework_1_1DNSAttack_1_1InitialQueryFailed__inherit__graph.png -------------------------------------------------------------------------------- /docs/html/search/all_9.js: -------------------------------------------------------------------------------- 1 | var searchData= 2 | [ 3 | ['main',['Main',['../namespaceMain.html',1,'']]], 4 | ['mode',['Mode',['../classdns__attack_1_1DNSAttack_1_1Mode.html',1,'dns_attack::DNSAttack']]] 5 | ]; 6 | -------------------------------------------------------------------------------- /docs/html/search/functions_4.js: -------------------------------------------------------------------------------- 1 | var searchData= 2 | [ 3 | ['open_5fsocket',['open_socket',['../classdns__poisoning_1_1DNSPoisoning.html#abd71b87190582b47006ea5f44554766a',1,'dns_poisoning::DNSPoisoning']]] 4 | ]; 5 | -------------------------------------------------------------------------------- /docs/html/search/variables_7.js: -------------------------------------------------------------------------------- 1 | var searchData= 2 | [ 3 | ['random_5furl',['random_url',['../classdns__poisoning_1_1DNSPoisoning.html#a644377ab26bf8c1a546fa45988edffaa',1,'dns_poisoning::DNSPoisoning']]] 4 | ]; 5 | -------------------------------------------------------------------------------- /launch.sh: -------------------------------------------------------------------------------- 1 | #!/bin/bash 2 | sudo python3 main.py -t "bankofallan.co.uk" -a "192.168.56.1" -v "192.168.56.3" -ns "10.0.0.1" -m "NORMAL" -bs "192.168.56.1" -bp 55553 -bd "badguy.ru" -i "vboxnet0" -vb 1 -at "NORMAL" 3 | -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1DNSAttack_1_1InvalidAttackType__inherit__graph.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/html/classdns__attack_1_1DNSAttack_1_1InvalidAttackType__inherit__graph.png -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1DNSAttack_1_1InvalidIPAddress__inherit__graph.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/html/classdns__attack_1_1DNSAttack_1_1InvalidIPAddress__inherit__graph.png -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1DNSAttack_1_1SuccessfulAttack__inherit__graph.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/html/classdns__attack_1_1DNSAttack_1_1SuccessfulAttack__inherit__graph.png -------------------------------------------------------------------------------- /docs/html/classdns__poisoning_1_1DNSPoisoning_1_1AttackType__inherit__graph.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/html/classdns__poisoning_1_1DNSPoisoning_1_1AttackType__inherit__graph.png -------------------------------------------------------------------------------- /docs/html/classdns__poisoning_1_1DNSPoisoning_1_1InvalidMAC__inherit__graph.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/html/classdns__poisoning_1_1DNSPoisoning_1_1InvalidMAC__inherit__graph.png -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1DNSAttack_1_1InitialQueryFailed__inherit__graph.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/html/classdns__attack_1_1DNSAttack_1_1InitialQueryFailed__inherit__graph.png -------------------------------------------------------------------------------- /docs/html/search/functions_2.js: -------------------------------------------------------------------------------- 1 | var searchData= 2 | [ 3 | ['faster_5fflooding',['faster_flooding',['../classdns__poisoning_1_1DNSPoisoning.html#a5b88cb0469db0817033e43088f6c17fd',1,'dns_poisoning::DNSPoisoning']]] 4 | ]; 5 | -------------------------------------------------------------------------------- /docs/html/search/variables_4.js: -------------------------------------------------------------------------------- 1 | var searchData= 2 | [ 3 | ['interrupt_5fhandler',['interrupt_handler',['../classdns__poisoning_1_1DNSPoisoning.html#a9c8aa320d6ae14df500e4e04cf5f0881',1,'dns_poisoning::DNSPoisoning']]] 4 | ]; 5 | -------------------------------------------------------------------------------- /launch_fast.sh: -------------------------------------------------------------------------------- 1 | #!/bin/bash 2 | sudo python3 main.py -t "bankofallan.co.uk" -a "192.168.56.1" -v "192.168.56.3" -ns "10.0.0.1" -m "FAST" -vm "08:00:27:be:48:1d" -bs "192.168.56.1" -bp 55553 -bd "badguy.ru" -i "vboxnet0" -vb 1 -at "NORMAL" 3 | -------------------------------------------------------------------------------- /docs/html/search/all_e.js: -------------------------------------------------------------------------------- 1 | var searchData= 2 | [ 3 | ['todo_20list',['Todo List',['../todo.html',1,'']]], 4 | ['ttl',['ttl',['../classdns__poisoning_1_1DNSPoisoning.html#a3d11bc7dacd26234e0dab3a2369d7711',1,'dns_poisoning::DNSPoisoning']]] 5 | ]; 6 | -------------------------------------------------------------------------------- /docs/html/search/classes_2.js: -------------------------------------------------------------------------------- 1 | var searchData= 2 | [ 3 | ['dnsattack',['DNSAttack',['../classdns__attack_1_1DNSAttack.html',1,'dns_attack']]], 4 | ['dnspoisoning',['DNSPoisoning',['../classdns__poisoning_1_1DNSPoisoning.html',1,'dns_poisoning']]] 5 | ]; 6 | -------------------------------------------------------------------------------- /docs/html/inherit_graph_0.map: -------------------------------------------------------------------------------- 1 | 4 | -------------------------------------------------------------------------------- /docs/html/inherit_graph_3.map: -------------------------------------------------------------------------------- 1 | 4 | -------------------------------------------------------------------------------- /docs/html/search/all_8.js: -------------------------------------------------------------------------------- 1 | var searchData= 2 | [ 3 | ['log',['log',['../classdns__attack_1_1DNSAttack.html#a74f5736228981dac0dca713508b0e995',1,'dns_attack.DNSAttack.log()'],['../classdns__poisoning_1_1DNSPoisoning.html#ad3a9cdfed9445196223af306ef932230',1,'dns_poisoning.DNSPoisoning.log()']]] 4 | ]; 5 | -------------------------------------------------------------------------------- /docs/html/search/variables_5.js: -------------------------------------------------------------------------------- 1 | var searchData= 2 | [ 3 | ['log',['log',['../classdns__attack_1_1DNSAttack.html#a74f5736228981dac0dca713508b0e995',1,'dns_attack.DNSAttack.log()'],['../classdns__poisoning_1_1DNSPoisoning.html#ad3a9cdfed9445196223af306ef932230',1,'dns_poisoning.DNSPoisoning.log()']]] 4 | ]; 5 | -------------------------------------------------------------------------------- /docs/html/search/all_0.js: -------------------------------------------------------------------------------- 1 | var searchData= 2 | [ 3 | ['_5f_5finit_5f_5f',['__init__',['../classdns__attack_1_1DNSAttack.html#afbfd871ee7ec8dd48de0dd7bac86d302',1,'dns_attack.DNSAttack.__init__()'],['../classdns__poisoning_1_1DNSPoisoning.html#a705af864438995c30b179e7951fd974a',1,'dns_poisoning.DNSPoisoning.__init__()']]] 4 | ]; 5 | -------------------------------------------------------------------------------- /docs/html/search/functions_0.js: -------------------------------------------------------------------------------- 1 | var searchData= 2 | [ 3 | ['_5f_5finit_5f_5f',['__init__',['../classdns__attack_1_1DNSAttack.html#afbfd871ee7ec8dd48de0dd7bac86d302',1,'dns_attack.DNSAttack.__init__()'],['../classdns__poisoning_1_1DNSPoisoning.html#a705af864438995c30b179e7951fd974a',1,'dns_poisoning.DNSPoisoning.__init__()']]] 4 | ]; 5 | -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1DNSAttack_1_1NSFetchError__coll__graph.map: -------------------------------------------------------------------------------- 1 | 4 | -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1DNSAttack_1_1NSFetchError__inherit__graph.map: -------------------------------------------------------------------------------- 1 | 4 | -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1DNSAttack_1_1InvalidIPAddress__coll__graph.map: -------------------------------------------------------------------------------- 1 | 4 | -------------------------------------------------------------------------------- /docs/html/search/all_f.js: -------------------------------------------------------------------------------- 1 | var searchData= 2 | [ 3 | ['victim_5fmac',['victim_mac',['../classdns__attack_1_1DNSAttack.html#a965d51d4b608a26414e90f52da888f7f',1,'dns_attack::DNSAttack']]], 4 | ['victim_5fserver',['victim_server',['../classdns__poisoning_1_1DNSPoisoning.html#a7ddda8f8750a3f6be247ba0aa2ae62da',1,'dns_poisoning::DNSPoisoning']]] 5 | ]; 6 | -------------------------------------------------------------------------------- /docs/html/search/variables_2.js: -------------------------------------------------------------------------------- 1 | var searchData= 2 | [ 3 | ['dan',['DAN',['../classdns__poisoning_1_1DNSPoisoning_1_1AttackType.html#a13dd30d13ac1836566d3ef97229b99ec',1,'dns_poisoning::DNSPoisoning::AttackType']]], 4 | ['domain',['domain',['../classdns__attack_1_1DNSAttack.html#a2a6e6d32a14c8de84e25c7f071084e7d',1,'dns_attack::DNSAttack']]] 5 | ]; 6 | -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1DNSAttack_1_1InvalidAttackType__coll__graph.map: -------------------------------------------------------------------------------- 1 | 4 | -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1DNSAttack_1_1InvalidIPAddress__inherit__graph.map: -------------------------------------------------------------------------------- 1 | 4 | -------------------------------------------------------------------------------- /docs/html/search/all_5.js: -------------------------------------------------------------------------------- 1 | var searchData= 2 | [ 3 | ['fast',['FAST',['../classdns__attack_1_1DNSAttack_1_1Mode.html#a7de52c622511a5fd41e3682ada3ace0c',1,'dns_attack::DNSAttack::Mode']]], 4 | ['faster_5fflooding',['faster_flooding',['../classdns__poisoning_1_1DNSPoisoning.html#a5b88cb0469db0817033e43088f6c17fd',1,'dns_poisoning::DNSPoisoning']]] 5 | ]; 6 | -------------------------------------------------------------------------------- /docs/html/search/variables_a.js: -------------------------------------------------------------------------------- 1 | var searchData= 2 | [ 3 | ['victim_5fmac',['victim_mac',['../classdns__attack_1_1DNSAttack.html#a965d51d4b608a26414e90f52da888f7f',1,'dns_attack::DNSAttack']]], 4 | ['victim_5fserver',['victim_server',['../classdns__poisoning_1_1DNSPoisoning.html#a7ddda8f8750a3f6be247ba0aa2ae62da',1,'dns_poisoning::DNSPoisoning']]] 5 | ]; 6 | -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1DNSAttack_1_1InitialQueryFailed__coll__graph.map: -------------------------------------------------------------------------------- 1 | 4 | -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1DNSAttack_1_1InitialQueryFailed__inherit__graph.map: -------------------------------------------------------------------------------- 1 | 4 | -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1DNSAttack_1_1InvalidAttackType__inherit__graph.map: -------------------------------------------------------------------------------- 1 | 4 | -------------------------------------------------------------------------------- /docs/html/search/functions_1.js: -------------------------------------------------------------------------------- 1 | var searchData= 2 | [ 3 | ['check_5fpoisoning',['check_poisoning',['../classdns__attack_1_1DNSAttack.html#a6311d646d23a4350d3a2ffa56816d306',1,'dns_attack::DNSAttack']]], 4 | ['create_5fsocket',['create_socket',['../classdns__poisoning_1_1DNSPoisoning.html#a429a52b36eab4711850c5e67aa8785f8',1,'dns_poisoning::DNSPoisoning']]] 5 | ]; 6 | -------------------------------------------------------------------------------- /docs/html/inherit_graph_2.map: -------------------------------------------------------------------------------- 1 | 5 | -------------------------------------------------------------------------------- /docs/latex/namespaceDNS__Poisoning.tex: -------------------------------------------------------------------------------- 1 | \hypertarget{namespaceDNS__Poisoning}{}\section{D\+N\+S\+\_\+\+Poisoning Namespace Reference} 2 | \label{namespaceDNS__Poisoning}\index{D\+N\+S\+\_\+\+Poisoning@{D\+N\+S\+\_\+\+Poisoning}} 3 | 4 | 5 | This package includes all function to execute the poisoning attack. 6 | 7 | 8 | 9 | 10 | \subsection{Detailed Description} 11 | This package includes all function to execute the poisoning attack. -------------------------------------------------------------------------------- /docs/latex/namespaceDNS__Attack.tex: -------------------------------------------------------------------------------- 1 | \hypertarget{namespaceDNS__Attack}{}\section{D\+N\+S\+\_\+\+Attack Namespace Reference} 2 | \label{namespaceDNS__Attack}\index{D\+N\+S\+\_\+\+Attack@{D\+N\+S\+\_\+\+Attack}} 3 | 4 | 5 | This package is responsible to execute all the passage required for the attack. 6 | 7 | 8 | 9 | 10 | \subsection{Detailed Description} 11 | This package is responsible to execute all the passage required for the attack. -------------------------------------------------------------------------------- /docs/html/search/all_2.js: -------------------------------------------------------------------------------- 1 | var searchData= 2 | [ 3 | ['bad_5fdomain',['bad_domain',['../classdns__attack_1_1DNSAttack.html#ae7ebfd2135a524378b145e11fd7024a0',1,'dns_attack::DNSAttack']]], 4 | ['bad_5fudp_5fip',['bad_udp_ip',['../classdns__attack_1_1DNSAttack.html#a717eee68d7b112742663b35564989539',1,'dns_attack::DNSAttack']]], 5 | ['bad_5fudp_5fport',['bad_udp_port',['../classdns__attack_1_1DNSAttack.html#ac6b322e114c263150ac2810a4e7bb545',1,'dns_attack::DNSAttack']]] 6 | ]; 7 | -------------------------------------------------------------------------------- /docs/html/search/all_3.js: -------------------------------------------------------------------------------- 1 | var searchData= 2 | [ 3 | ['check_5fpoisoning',['check_poisoning',['../classdns__attack_1_1DNSAttack.html#a6311d646d23a4350d3a2ffa56816d306',1,'dns_attack::DNSAttack']]], 4 | ['create_5fsocket',['create_socket',['../classdns__poisoning_1_1DNSPoisoning.html#a429a52b36eab4711850c5e67aa8785f8',1,'dns_poisoning::DNSPoisoning']]], 5 | ['criticalerror',['CriticalError',['../classdns__attack_1_1DNSAttack_1_1CriticalError.html',1,'dns_attack::DNSAttack']]] 6 | ]; 7 | -------------------------------------------------------------------------------- /docs/html/search/variables_1.js: -------------------------------------------------------------------------------- 1 | var searchData= 2 | [ 3 | ['bad_5fdomain',['bad_domain',['../classdns__attack_1_1DNSAttack.html#ae7ebfd2135a524378b145e11fd7024a0',1,'dns_attack::DNSAttack']]], 4 | ['bad_5fudp_5fip',['bad_udp_ip',['../classdns__attack_1_1DNSAttack.html#a717eee68d7b112742663b35564989539',1,'dns_attack::DNSAttack']]], 5 | ['bad_5fudp_5fport',['bad_udp_port',['../classdns__attack_1_1DNSAttack.html#ac6b322e114c263150ac2810a4e7bb545',1,'dns_attack::DNSAttack']]] 6 | ]; 7 | -------------------------------------------------------------------------------- /docs/latex/hierarchy.tex: -------------------------------------------------------------------------------- 1 | \section{Class Hierarchy} 2 | This inheritance list is sorted roughly, but not completely, alphabetically\+:\begin{DoxyCompactList} 3 | \item \contentsline{section}{dns\+\_\+poisoning.\+D\+N\+S\+Poisoning}{\pageref{classdns__poisoning_1_1DNSPoisoning}}{} 4 | \item Exception\begin{DoxyCompactList} 5 | \item \contentsline{section}{dns\+\_\+attack.\+Initial\+Query\+Failed}{\pageref{classdns__attack_1_1InitialQueryFailed}}{} 6 | \end{DoxyCompactList} 7 | \end{DoxyCompactList} 8 | -------------------------------------------------------------------------------- /docs/latex/annotated.tex: -------------------------------------------------------------------------------- 1 | \section{Class List} 2 | Here are the classes, structs, unions and interfaces with brief descriptions\+:\begin{DoxyCompactList} 3 | \item\contentsline{section}{\hyperlink{classdns__poisoning_1_1DNSPoisoning}{dns\+\_\+poisoning.\+D\+N\+S\+Poisoning} }{\pageref{classdns__poisoning_1_1DNSPoisoning}}{} 4 | \item\contentsline{section}{\hyperlink{classdns__attack_1_1InitialQueryFailed}{dns\+\_\+attack.\+Initial\+Query\+Failed} }{\pageref{classdns__attack_1_1InitialQueryFailed}}{} 5 | \end{DoxyCompactList} 6 | -------------------------------------------------------------------------------- /docs/html/search/nomatches.html: -------------------------------------------------------------------------------- 1 | 2 |
|
24 | DNS Poisoning Tool
25 |
26 | |
27 |
aaaaaaaaaaaaaaaaaa
62 |
67 | 1.8.13
68 |
69 |
70 |
71 |
--------------------------------------------------------------------------------
/docs/html/index.html:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 |
5 |
6 |
7 |
8 | |
24 | DNS Poisoning Tool
25 |
26 | |
27 |
70 | 1.8.13
71 |
72 |
73 |
74 |
--------------------------------------------------------------------------------
/docs/html/bug.html:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 |
5 |
6 |
7 |
8 | |
24 | DNS Poisoning Tool
25 |
26 | |
27 |
74 | 1.8.13
75 |
76 |
77 |
78 |
--------------------------------------------------------------------------------
/docs/html/pages.html:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 |
5 |
6 |
7 |
8 | |
24 | DNS Poisoning Tool
25 |
26 | |
27 |
| Todo List |
75 | 1.8.13
76 |
77 |
78 |
79 |
--------------------------------------------------------------------------------
/docs/html/namespaceDNS__Attack.html:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 |
5 |
6 |
7 |
8 | |
24 | DNS Poisoning Tool
25 |
26 | |
27 |
This package is responsible to execute all the passage required for the attack. 67 | More...
68 |This package is responsible to execute all the passage required for the attack.
70 |
75 | 1.8.13
76 |
77 |
78 |
79 |
--------------------------------------------------------------------------------
/docs/html/namespaceMain.html:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 |
5 |
6 |
7 |
8 | |
24 | DNS Poisoning Tool
25 |
26 | |
27 |
This package is responsible to execute all the passages required for the attack related to our ETH homework. 67 | More...
68 |This package is responsible to execute all the passages required for the attack related to our ETH homework.
70 |
75 | 1.8.13
76 |
77 |
78 |
79 |
--------------------------------------------------------------------------------
/docs/html/dynsections.js:
--------------------------------------------------------------------------------
1 | function toggleVisibility(linkObj)
2 | {
3 | var base = $(linkObj).attr('id');
4 | var summary = $('#'+base+'-summary');
5 | var content = $('#'+base+'-content');
6 | var trigger = $('#'+base+'-trigger');
7 | var src=$(trigger).attr('src');
8 | if (content.is(':visible')===true) {
9 | content.hide();
10 | summary.show();
11 | $(linkObj).addClass('closed').removeClass('opened');
12 | $(trigger).attr('src',src.substring(0,src.length-8)+'closed.png');
13 | } else {
14 | content.show();
15 | summary.hide();
16 | $(linkObj).removeClass('closed').addClass('opened');
17 | $(trigger).attr('src',src.substring(0,src.length-10)+'open.png');
18 | }
19 | return false;
20 | }
21 |
22 | function updateStripes()
23 | {
24 | $('table.directory tr').
25 | removeClass('even').filter(':visible:even').addClass('even');
26 | }
27 |
28 | function toggleLevel(level)
29 | {
30 | $('table.directory tr').each(function() {
31 | var l = this.id.split('_').length-1;
32 | var i = $('#img'+this.id.substring(3));
33 | var a = $('#arr'+this.id.substring(3));
34 | if (l|
24 | DNS Poisoning Tool
25 |
26 | |
27 |
76 | 1.8.13
77 |
78 |
79 |
80 |
--------------------------------------------------------------------------------
/docs/html/namespaces.html:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 |
5 |
6 |
7 |
8 | |
24 | DNS Poisoning Tool
25 |
26 | |
27 |
| NDNS_Attack | This package is responsible to execute all the passage required for the attack |
| NMain | This package is responsible to execute all the passages required for the attack related to our ETH homework |
76 | 1.8.13
77 |
78 |
79 |
80 |
--------------------------------------------------------------------------------
/docs/html/namespaceDNS__Poisoning.html:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 |
5 |
6 |
7 |
8 | |
24 | DNS Poisoning Tool
25 |
26 | |
27 |
This package includes all methos to execute the poisoning attack. 67 | More...
68 |This package includes all methos to execute the poisoning attack.
70 |DNSPoisoning.faster_flooding sends packet at layer two (for this reason it requires both victim MAC and network interface specified) , making the attack faster and more prone to succed. However this feature can be used only when the victim server is on the same network of the attacker.
71 | DNSPoisoning.start instead uses the IP layer and therefore can be applied in any situation.
72 | Two types of attack are implemented:
The first one only tries to spoof a single domain (the one setted in the "spoofed_domain") while the other one tries to spoof the NS server.
77 |
82 | 1.8.13
83 |
84 |
85 |
86 |
--------------------------------------------------------------------------------
/docs/html/classdns__attack_1_1DNSAttack_1_1Mode-members.html:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 |
5 |
6 |
7 |
8 | |
24 | DNS Poisoning Tool
25 |
26 | |
27 |
This is the complete list of members for dns_attack.DNSAttack.Mode, including all inherited members.
71 || FAST | dns_attack.DNSAttack.Mode | static |
| NORMAL | dns_attack.DNSAttack.Mode | static |
79 | 1.8.13
80 |
81 |
82 |
83 |
--------------------------------------------------------------------------------
/docs/html/classdns__poisoning_1_1DNSPoisoning_1_1AttackType-members.html:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 |
5 |
6 |
7 |
8 | |
24 | DNS Poisoning Tool
25 |
26 | |
27 |
This is the complete list of members for dns_poisoning.DNSPoisoning.AttackType, including all inherited members.
71 || DAN | dns_poisoning.DNSPoisoning.AttackType | static |
| NORMAL | dns_poisoning.DNSPoisoning.AttackType | static |
79 | 1.8.13
80 |
81 |
82 |
83 |
--------------------------------------------------------------------------------
/docs/latex/classdns__poisoning_1_1DNSPoisoning.tex:
--------------------------------------------------------------------------------
1 | \hypertarget{classdns__poisoning_1_1DNSPoisoning}{}\section{dns\+\_\+poisoning.\+D\+N\+S\+Poisoning Class Reference}
2 | \label{classdns__poisoning_1_1DNSPoisoning}\index{dns\+\_\+poisoning.\+D\+N\+S\+Poisoning@{dns\+\_\+poisoning.\+D\+N\+S\+Poisoning}}
3 | \subsection*{Public Member Functions}
4 | \begin{DoxyCompactItemize}
5 | \item
6 | \mbox{\Hypertarget{classdns__poisoning_1_1DNSPoisoning_a2aefb588dff724bbb239fb54e2c6ca19}\label{classdns__poisoning_1_1DNSPoisoning_a2aefb588dff724bbb239fb54e2c6ca19}}
7 | def {\bfseries \+\_\+\+\_\+init\+\_\+\+\_\+} (self, victim\+\_\+server, spoofed\+\_\+domain, attacker\+\_\+ip, authoritative\+\_\+nameserver, initial\+\_\+id, interrupt\+\_\+handler=None, log=lambda msg\+:\+None)
8 | \item
9 | \mbox{\Hypertarget{classdns__poisoning_1_1DNSPoisoning_a7208959663e75447b0221fc7fab129e7}\label{classdns__poisoning_1_1DNSPoisoning_a7208959663e75447b0221fc7fab129e7}}
10 | def {\bfseries send\+\_\+crafted\+\_\+packet} (self, id\+\_\+req)
11 | \item
12 | \mbox{\Hypertarget{classdns__poisoning_1_1DNSPoisoning_a0c8ff9306f38db988648645b93f399d1}\label{classdns__poisoning_1_1DNSPoisoning_a0c8ff9306f38db988648645b93f399d1}}
13 | def {\bfseries send\+\_\+inital\+\_\+query} (self)
14 | \item
15 | \mbox{\Hypertarget{classdns__poisoning_1_1DNSPoisoning_a1154be89dbdf8a2769a2ca1d3635f363}\label{classdns__poisoning_1_1DNSPoisoning_a1154be89dbdf8a2769a2ca1d3635f363}}
16 | def {\bfseries start\+\_\+flooding} (self)
17 | \item
18 | \mbox{\Hypertarget{classdns__poisoning_1_1DNSPoisoning_aa59092cd2bd23620644af9814f782888}\label{classdns__poisoning_1_1DNSPoisoning_aa59092cd2bd23620644af9814f782888}}
19 | def {\bfseries check\+\_\+poisoning} (self)
20 | \item
21 | \mbox{\Hypertarget{classdns__poisoning_1_1DNSPoisoning_a65f1f3e1f022f64ca35c73b80b6ccbfe}\label{classdns__poisoning_1_1DNSPoisoning_a65f1f3e1f022f64ca35c73b80b6ccbfe}}
22 | def {\bfseries stop\+\_\+handler} (self, sig, frame)
23 | \end{DoxyCompactItemize}
24 | \subsection*{Public Attributes}
25 | \begin{DoxyCompactItemize}
26 | \item
27 | \mbox{\Hypertarget{classdns__poisoning_1_1DNSPoisoning_a7ddda8f8750a3f6be247ba0aa2ae62da}\label{classdns__poisoning_1_1DNSPoisoning_a7ddda8f8750a3f6be247ba0aa2ae62da}}
28 | {\bfseries victim\+\_\+server}
29 | \item
30 | \mbox{\Hypertarget{classdns__poisoning_1_1DNSPoisoning_a837298577cd23e34cf06ca469ab2ae77}\label{classdns__poisoning_1_1DNSPoisoning_a837298577cd23e34cf06ca469ab2ae77}}
31 | {\bfseries spoofed\+\_\+domain}
32 | \item
33 | \mbox{\Hypertarget{classdns__poisoning_1_1DNSPoisoning_a1930111c8e62f71561f7fc808f17f306}\label{classdns__poisoning_1_1DNSPoisoning_a1930111c8e62f71561f7fc808f17f306}}
34 | {\bfseries attacker\+\_\+ip}
35 | \item
36 | \mbox{\Hypertarget{classdns__poisoning_1_1DNSPoisoning_a96cc4f6a6168118999763b206b72cf96}\label{classdns__poisoning_1_1DNSPoisoning_a96cc4f6a6168118999763b206b72cf96}}
37 | {\bfseries id}
38 | \item
39 | \mbox{\Hypertarget{classdns__poisoning_1_1DNSPoisoning_a5cee7b7d0614a3baade77dcf4d5db1d7}\label{classdns__poisoning_1_1DNSPoisoning_a5cee7b7d0614a3baade77dcf4d5db1d7}}
40 | {\bfseries sport}
41 | \item
42 | \mbox{\Hypertarget{classdns__poisoning_1_1DNSPoisoning_ab54c7e8e4345d5ac1b054a2bf91aead5}\label{classdns__poisoning_1_1DNSPoisoning_ab54c7e8e4345d5ac1b054a2bf91aead5}}
43 | {\bfseries flood\+\_\+socket}
44 | \item
45 | \mbox{\Hypertarget{classdns__poisoning_1_1DNSPoisoning_a2b7e61ab81185add0d7a97baab36924f}\label{classdns__poisoning_1_1DNSPoisoning_a2b7e61ab81185add0d7a97baab36924f}}
46 | {\bfseries auth\+\_\+nameserver}
47 | \item
48 | \mbox{\Hypertarget{classdns__poisoning_1_1DNSPoisoning_a00a22b2725214b6052827a16b067066e}\label{classdns__poisoning_1_1DNSPoisoning_a00a22b2725214b6052827a16b067066e}}
49 | {\bfseries flood\+\_\+pool}
50 | \item
51 | \mbox{\Hypertarget{classdns__poisoning_1_1DNSPoisoning_a9c8aa320d6ae14df500e4e04cf5f0881}\label{classdns__poisoning_1_1DNSPoisoning_a9c8aa320d6ae14df500e4e04cf5f0881}}
52 | {\bfseries interrupt\+\_\+handler}
53 | \item
54 | \mbox{\Hypertarget{classdns__poisoning_1_1DNSPoisoning_a57e074a324e5682d4a0a0a02856c8e39}\label{classdns__poisoning_1_1DNSPoisoning_a57e074a324e5682d4a0a0a02856c8e39}}
55 | {\bfseries invalid\+\_\+url}
56 | \end{DoxyCompactItemize}
57 |
58 |
59 | The documentation for this class was generated from the following file\+:\begin{DoxyCompactItemize}
60 | \item
61 | dns\+\_\+poisoning.\+py\end{DoxyCompactItemize}
62 |
--------------------------------------------------------------------------------
/docs/html/classdns__attack_1_1DNSAttack_1_1SuccessfulAttack.html:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 |
5 |
6 |
7 |
8 | |
24 | DNS Poisoning Tool
25 |
26 | |
27 |
Raised when the attack succeded. 71 | More...
72 |

Raised when the attack succeded.
84 |
92 | 1.8.13
93 |
94 |
95 |
96 |
--------------------------------------------------------------------------------
/docs/html/classdns__poisoning_1_1DNSPoisoning_1_1InvalidMAC.html:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 |
5 |
6 |
7 |
8 | |
24 | DNS Poisoning Tool
25 |
26 | |
27 |
Raised when an invalid MAC address is provided. 71 | More...
72 |

Raised when an invalid MAC address is provided.
84 |
92 | 1.8.13
93 |
94 |
95 |
96 |
--------------------------------------------------------------------------------
/docs/latex/refman.tex:
--------------------------------------------------------------------------------
1 | \documentclass[twoside]{book}
2 |
3 | % Packages required by doxygen
4 | \usepackage{fixltx2e}
5 | \usepackage{calc}
6 | \usepackage{doxygen}
7 | \usepackage[export]{adjustbox} % also loads graphicx
8 | \usepackage{graphicx}
9 | \usepackage[utf8]{inputenc}
10 | \usepackage{makeidx}
11 | \usepackage{multicol}
12 | \usepackage{multirow}
13 | \PassOptionsToPackage{warn}{textcomp}
14 | \usepackage{textcomp}
15 | \usepackage[nointegrals]{wasysym}
16 | \usepackage[table]{xcolor}
17 |
18 | % Font selection
19 | \usepackage[T1]{fontenc}
20 | \usepackage[scaled=.90]{helvet}
21 | \usepackage{courier}
22 | \usepackage{amssymb}
23 | \usepackage{sectsty}
24 | \renewcommand{\familydefault}{\sfdefault}
25 | \allsectionsfont{%
26 | \fontseries{bc}\selectfont%
27 | \color{darkgray}%
28 | }
29 | \renewcommand{\DoxyLabelFont}{%
30 | \fontseries{bc}\selectfont%
31 | \color{darkgray}%
32 | }
33 | \newcommand{\+}{\discretionary{\mbox{\scriptsize$\hookleftarrow$}}{}{}}
34 |
35 | % Page & text layout
36 | \usepackage{geometry}
37 | \geometry{%
38 | a4paper,%
39 | top=2.5cm,%
40 | bottom=2.5cm,%
41 | left=2.5cm,%
42 | right=2.5cm%
43 | }
44 | \tolerance=750
45 | \hfuzz=15pt
46 | \hbadness=750
47 | \setlength{\emergencystretch}{15pt}
48 | \setlength{\parindent}{0cm}
49 | \setlength{\parskip}{3ex plus 2ex minus 2ex}
50 | \makeatletter
51 | \renewcommand{\paragraph}{%
52 | \@startsection{paragraph}{4}{0ex}{-1.0ex}{1.0ex}{%
53 | \normalfont\normalsize\bfseries\SS@parafont%
54 | }%
55 | }
56 | \renewcommand{\subparagraph}{%
57 | \@startsection{subparagraph}{5}{0ex}{-1.0ex}{1.0ex}{%
58 | \normalfont\normalsize\bfseries\SS@subparafont%
59 | }%
60 | }
61 | \makeatother
62 |
63 | % Headers & footers
64 | \usepackage{fancyhdr}
65 | \pagestyle{fancyplain}
66 | \fancyhead[LE]{\fancyplain{}{\bfseries\thepage}}
67 | \fancyhead[CE]{\fancyplain{}{}}
68 | \fancyhead[RE]{\fancyplain{}{\bfseries\leftmark}}
69 | \fancyhead[LO]{\fancyplain{}{\bfseries\rightmark}}
70 | \fancyhead[CO]{\fancyplain{}{}}
71 | \fancyhead[RO]{\fancyplain{}{\bfseries\thepage}}
72 | \fancyfoot[LE]{\fancyplain{}{}}
73 | \fancyfoot[CE]{\fancyplain{}{}}
74 | \fancyfoot[RE]{\fancyplain{}{\bfseries\scriptsize Generated by Doxygen }}
75 | \fancyfoot[LO]{\fancyplain{}{\bfseries\scriptsize Generated by Doxygen }}
76 | \fancyfoot[CO]{\fancyplain{}{}}
77 | \fancyfoot[RO]{\fancyplain{}{}}
78 | \renewcommand{\footrulewidth}{0.4pt}
79 | \renewcommand{\chaptermark}[1]{%
80 | \markboth{#1}{}%
81 | }
82 | \renewcommand{\sectionmark}[1]{%
83 | \markright{\thesection\ #1}%
84 | }
85 |
86 | % Indices & bibliography
87 | \usepackage{natbib}
88 | \usepackage[titles]{tocloft}
89 | \setcounter{tocdepth}{3}
90 | \setcounter{secnumdepth}{5}
91 | \makeindex
92 |
93 | % Hyperlinks (required, but should be loaded last)
94 | \usepackage{ifpdf}
95 | \ifpdf
96 | \usepackage[pdftex,pagebackref=true]{hyperref}
97 | \else
98 | \usepackage[ps2pdf,pagebackref=true]{hyperref}
99 | \fi
100 | \hypersetup{%
101 | colorlinks=true,%
102 | linkcolor=blue,%
103 | citecolor=blue,%
104 | unicode%
105 | }
106 |
107 | % Custom commands
108 | \newcommand{\clearemptydoublepage}{%
109 | \newpage{\pagestyle{empty}\cleardoublepage}%
110 | }
111 |
112 | \usepackage{caption}
113 | \captionsetup{labelsep=space,justification=centering,font={bf},singlelinecheck=off,skip=4pt,position=top}
114 |
115 | %===== C O N T E N T S =====
116 |
117 | \begin{document}
118 |
119 | % Titlepage & ToC
120 | \hypersetup{pageanchor=false,
121 | bookmarksnumbered=true,
122 | pdfencoding=unicode
123 | }
124 | \pagenumbering{alph}
125 | \begin{titlepage}
126 | \vspace*{7cm}
127 | \begin{center}%
128 | {\Large D\+NS Poisoning Tool }\\
129 | \vspace*{1cm}
130 | {\large Generated by Doxygen 1.8.13}\\
131 | \end{center}
132 | \end{titlepage}
133 | \clearemptydoublepage
134 | \pagenumbering{roman}
135 | \tableofcontents
136 | \clearemptydoublepage
137 | \pagenumbering{arabic}
138 | \hypersetup{pageanchor=true}
139 |
140 | %--- Begin generated contents ---
141 | \chapter{Namespace Index}
142 | \input{namespaces}
143 | \chapter{Hierarchical Index}
144 | \input{hierarchy}
145 | \chapter{Class Index}
146 | \input{annotated}
147 | \chapter{Namespace Documentation}
148 | \input{namespaceDNS__Attack}
149 | \input{namespaceDNS__Poisoning}
150 | \chapter{Class Documentation}
151 | \input{classdns__poisoning_1_1DNSPoisoning}
152 | \input{classdns__attack_1_1InitialQueryFailed}
153 | %--- End generated contents ---
154 |
155 | % Index
156 | \backmatter
157 | \newpage
158 | \phantomsection
159 | \clearemptydoublepage
160 | \addcontentsline{toc}{chapter}{Index}
161 | \printindex
162 |
163 | \end{document}
164 |
--------------------------------------------------------------------------------
/docs/html/classdns__attack_1_1InitialQueryFailed.html:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 |
5 |
6 |
7 |
8 | |
24 | DNS Poisoning Tool
25 |
26 | |
27 |
InitialQueryFailed Exception raised when the initial query fails. 71 | More...
72 |

InitialQueryFailed Exception raised when the initial query fails.
84 |Raised when initial query performed to get a TXID fails
85 |
93 | 1.8.13
94 |
95 |
96 |
97 |
--------------------------------------------------------------------------------
/docs/html/classhomework_1_1DNSAttack_1_1InitialQueryFailed.html:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 |
5 |
6 |
7 |
8 | |
24 | DNS Poisoning Tool
25 |
26 | |
27 |
InitialQueryFailed Exception raised when the initial query fails. 71 | More...
72 |

InitialQueryFailed Exception raised when the initial query fails.
84 |Raised when initial query performed to get a TXID fails
85 |
93 | 1.8.13
94 |
95 |
96 |
97 |
--------------------------------------------------------------------------------
/README.md:
--------------------------------------------------------------------------------
1 | # DNS Poisoning Tool
2 | A tool to perform DNS cache poisoning against vulnerable server.
3 |
4 | 
5 |
6 | Both attack methodology is widely described here: [Kaminsky Attack](http://unixwiz.net/techtips/iguide-kaminsky-dns-vuln.html)
7 |
8 | A detailed software documentation can be found [here](https://gr3yc4t.github.io/dns-poisoning-tool/html/annotated.html)
9 |
10 | **WARNING**: This code is intended to be used only in the context of a particular assignment. If you want to reuse some of the functionalities refer to the [modules section](#modules).
11 |
12 | **NOTE**: When used to test homework result the **FAST** mode is mandatory since otherwise packets are transmitted too slowly causing the attack to fail.
13 |
14 | ## Requirements
15 | * Scapy (For packet crafting) `pip3 install scapy`
16 | * Blessing (For coloured terminal) `pip3 install blessings`
17 | * DNS Python (For initial DNS query) `pip3 install dnspython`
18 |
19 | Inline requirements installation command pip install:
20 |
21 | ```pip3 install scapy blessings dnspython```
22 |
23 | Otherwise simply use the provided requirements file
24 |
25 | ```pip3 install -r requirements.txt```
26 |
27 | ## Usage
28 | The files ```launch.sh``` and ```launch_fast.sh``` can be edited with all the necessary paramters to carry on the attack or, instead, you could use the command line parameter directly.
29 |
30 | ```
31 | usage: main.py [-h] -t DOMAIN -a ATTACKER_IP -v VICTIM_DNS_IP
32 | [-bs BAD_SERVER_IP] [-bp BAD_SERVER_PORT] -bd BAD_DOMAIN
33 | [-ns NS_SERVER] [-i INTERFACE] [-at {NORMAL,DAN}]
34 | [-m {NORMAL,FAST}] [-vm VICTIM_MAC] [-si SECRET_IP]
35 | [-sp SECRET_PORT] [-n NUM_ATTACK] [-nc] [-vb {1,2,3,4}]
36 |
37 | DNS Poisoning Attack Tool
38 |
39 | optional arguments:
40 | -h, --help show this help message and exit
41 | -t DOMAIN, --target-domain DOMAIN
42 | The target domain to spoof
43 | -a ATTACKER_IP, --attacker-ip ATTACKER_IP
44 | Attacker IP address
45 | -v VICTIM_DNS_IP, --victim-dns-ip VICTIM_DNS_IP
46 | The victim DNS IP address
47 | -bs BAD_SERVER_IP, --bad-server-ip BAD_SERVER_IP
48 | The Bad Guy DNS server IP
49 | -bp BAD_SERVER_PORT, --bad-server-port BAD_SERVER_PORT
50 | The Bad Guy DNS server port
51 | -bd BAD_DOMAIN, --bad-domain BAD_DOMAIN
52 | The domain belonging to the attacker controlled zone
53 | -ns NS_SERVER, --ns-server NS_SERVER
54 | The victim authoritative server
55 | -i INTERFACE, --interface INTERFACE
56 | The Network Card interface to use
57 | -at {NORMAL,DAN}, --attack-type {NORMAL,DAN}
58 | The type of attack to perform
59 | -m {NORMAL,FAST}, --mode {NORMAL,FAST}
60 | Mode to use
61 | -vm VICTIM_MAC, --victim-mac VICTIM_MAC
62 | The victim MAC address
63 | -si SECRET_IP, --secret-ip SECRET_IP
64 | IP to bind for the secret fetcher
65 | -sp SECRET_PORT, --secret-port SECRET_PORT
66 | Port to bind for the secret fetcher
67 | -n NUM_ATTACK, --num-attack NUM_ATTACK
68 | Number of attack to perform
69 | -nc, --no-colors Suppress coloured terminal output
70 | -vb {1,2,3,4}, --verbosity {1,2,3,4}
71 | Verbosity level
72 | ```
73 | ## Features
74 | The tool support two version of the attack that can be specified with the related parameter
75 | * Classical poisoning ([Shenanigans Version 1](http://unixwiz.net/techtips/iguide-kaminsky-dns-vuln.html#shenanigansv1))
76 | * Dan's Shenanigans ([Dan's Version](http://unixwiz.net/techtips/iguide-kaminsky-dns-vuln.html#shenanigansv2))
77 |
78 | In addition two modes are available for flooding
79 | * **Normal Flooding** - which uses IP layer
80 | * **Faster Flooding** - which uses Ethernet layer
81 |
82 | When "*faster flooding*" is used, both victim MAC Address and a network interface must be supplied.
83 |
84 | The secret is printed both on the terminal output and in ```log_secret.txt``` file.
85 |
86 | ### Modules
87 | The code is developed in a modular way in order to be implemented in other tools. An extensive class documentation can be found [here](https://gr3yc4t.github.io/dns-poisoning-tool/html/annotated.html).
88 | For example the following code starts a flood of DNS crafted response against the server at "8.8.8.8" in order to spoof the google domain and redirect users to the attacker IP (66.66.66.66):
89 | ```python
90 | import DNSPoisoning
91 |
92 | poisoning = DNSPoisoning('8.8.8.8', 'www.google.com', '66.66.66.66')
93 | poisoning.start_flooding()
94 | ```
95 |
96 | ### Bugs
97 | When runninng in faster mode, a single CTRL+C signal is not sufficient to stop the execution due to some thread/signal handler bug. Therefore to completely stop the tool is required to hold CTRL+C for few seconds until the terminate the application.
98 |
--------------------------------------------------------------------------------
/docs/html/classdns__attack_1_1DNSAttack_1_1NSFetchError.html:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 |
5 |
6 |
7 |
8 | |
24 | DNS Poisoning Tool
25 |
26 | |
27 |
Exception raised when NS server IP cannot be fetched. 71 | More...
72 |

Exception raised when NS server IP cannot be fetched.
90 |Raised when NS server IP cannot be fetched
91 |
99 | 1.8.13
100 |
101 |
102 |
103 |
--------------------------------------------------------------------------------
/docs/html/classdns__attack_1_1DNSAttack_1_1InitialQueryFailed.html:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 |
5 |
6 |
7 |
8 | |
24 | DNS Poisoning Tool
25 |
26 | |
27 |
Exception raised when the initial query fails. 71 | More...
72 |

Exception raised when the initial query fails.
90 |Raised when initial query performed to get a TXID fails
91 |
99 | 1.8.13
100 |
101 |
102 |
103 |
--------------------------------------------------------------------------------
/docs/html/classdns__attack_1_1DNSAttack_1_1InvalidAttackType.html:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 |
5 |
6 |
7 |
8 | |
24 | DNS Poisoning Tool
25 |
26 | |
27 |
Exception raised when the passed attack type is not valid. 71 | More...
72 |

Exception raised when the passed attack type is not valid.
90 |Raised when the passed attack type is not valid
91 |
99 | 1.8.13
100 |
101 |
102 |
103 |
--------------------------------------------------------------------------------
/docs/html/classdns__attack_1_1DNSAttack_1_1InvalidIPAddress.html:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 |
5 |
6 |
7 |
8 | |
24 | DNS Poisoning Tool
25 |
26 | |
27 |
Exception raised when invalid IP address is passed. 71 | More...
72 |

Exception raised when invalid IP address is passed.
90 |Raised when the passed IP address is invalid
99 | 1.8.13
100 |
101 |
102 |
103 |
--------------------------------------------------------------------------------
/docs/html/classdns__attack_1_1DNSAttack_1_1CriticalError.html:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 |
5 |
6 |
7 |
8 | |
24 | DNS Poisoning Tool
25 |
26 | |
27 |
Raised when a critical error occurred. 71 | More...
72 |

Raised when a critical error occurred.
90 |
98 | 1.8.13
99 |
100 |
101 |
102 |
--------------------------------------------------------------------------------