├── docs ├── html │ ├── graph_legend.md5 │ ├── inherit_graph_0.md5 │ ├── inherit_graph_1.md5 │ ├── inherit_graph_2.md5 │ ├── inherit_graph_3.md5 │ ├── bc_s.png │ ├── bdwn.png │ ├── classdns__attack_1_1DNSAttack_1_1Mode__coll__graph.md5 │ ├── classdns__attack_1_1InitialQueryFailed__coll__graph.md5 │ ├── doc.png │ ├── open.png │ ├── classdns__attack_1_1DNSAttack_1_1Mode__inherit__graph.md5 │ ├── classdns__attack_1_1InitialQueryFailed__inherit__graph.md5 │ ├── closed.png │ ├── nav_f.png │ ├── nav_g.png │ ├── nav_h.png │ ├── tab_a.png │ ├── tab_b.png │ ├── tab_h.png │ ├── tab_s.png │ ├── classdns__attack_1_1DNSAttack_1_1CriticalError__coll__graph.md5 │ ├── classdns__attack_1_1DNSAttack_1_1CriticalError__inherit__graph.md5 │ ├── classdns__attack_1_1DNSAttack_1_1InvalidIPAddress__coll__graph.md5 │ ├── classdns__attack_1_1DNSAttack_1_1NSFetchError__coll__graph.md5 │ ├── classdns__attack_1_1DNSAttack_1_1NSFetchError__inherit__graph.md5 │ ├── classdns__attack_1_1DNSAttack_1_1SuccessfulAttack__coll__graph.md5 │ ├── classdns__poisoning_1_1DNSPoisoning_1_1AttackType__coll__graph.md5 │ ├── classdns__poisoning_1_1DNSPoisoning_1_1InvalidMAC__coll__graph.md5 │ ├── classhomework_1_1DNSAttack_1_1InitialQueryFailed__coll__graph.md5 │ ├── doxygen.png │ ├── splitbar.png │ ├── sync_off.png │ ├── sync_on.png │ ├── classdns__attack_1_1DNSAttack_1_1InitialQueryFailed__coll__graph.md5 │ ├── classdns__attack_1_1DNSAttack_1_1InitialQueryFailed__inherit__graph.md5 │ ├── classdns__attack_1_1DNSAttack_1_1InvalidAttackType__coll__graph.md5 │ ├── classdns__attack_1_1DNSAttack_1_1InvalidAttackType__inherit__graph.md5 │ ├── classdns__attack_1_1DNSAttack_1_1InvalidIPAddress__inherit__graph.md5 │ ├── classdns__attack_1_1DNSAttack_1_1SuccessfulAttack__inherit__graph.md5 │ ├── classdns__poisoning_1_1DNSPoisoning_1_1AttackType__inherit__graph.md5 │ ├── classdns__poisoning_1_1DNSPoisoning_1_1InvalidMAC__inherit__graph.md5 │ ├── classhomework_1_1DNSAttack_1_1InitialQueryFailed__inherit__graph.md5 │ ├── folderopen.png │ ├── folderclosed.png │ ├── graph_legend.png │ ├── search │ │ ├── close.png │ │ ├── mag_sel.png │ │ ├── pages_0.js │ │ ├── pages_1.js │ │ ├── namespaces_1.js │ │ ├── search_l.png │ │ ├── search_m.png │ │ ├── search_r.png │ │ ├── namespaces_0.js │ │ ├── classes_4.js │ │ ├── classes_5.js │ │ ├── classes_0.js │ │ ├── classes_1.js │ │ ├── classes_6.js │ │ ├── variables_9.js │ │ ├── variables_3.js │ │ ├── all_b.js │ │ ├── all_c.js │ │ ├── all_9.js │ │ ├── functions_4.js │ │ ├── variables_7.js │ │ ├── functions_2.js │ │ ├── variables_4.js │ │ ├── all_e.js │ │ ├── classes_2.js │ │ ├── all_8.js │ │ ├── variables_5.js │ │ ├── all_0.js │ │ ├── functions_0.js │ │ ├── all_f.js │ │ ├── variables_2.js │ │ ├── all_5.js │ │ ├── variables_a.js │ │ ├── functions_1.js │ │ ├── all_2.js │ │ ├── all_3.js │ │ ├── variables_1.js │ │ ├── nomatches.html │ │ ├── searchdata.js │ │ ├── classes_3.js │ │ ├── all_4.js │ │ ├── variables_6.js │ │ ├── all_6.js │ │ ├── functions_3.js │ │ ├── all_a.js │ │ ├── all_7.js │ │ ├── variables_0.js │ │ ├── variables_8.js │ │ ├── all_1.js │ │ ├── all_0.html │ │ ├── all_1.html │ │ ├── all_2.html │ │ ├── all_3.html │ │ ├── all_4.html │ │ ├── all_5.html │ │ ├── all_6.html │ │ ├── all_7.html │ │ ├── all_8.html │ │ ├── all_9.html │ │ ├── all_a.html │ │ ├── all_b.html │ │ ├── all_c.html │ │ ├── all_d.html │ │ ├── all_e.html │ │ ├── all_f.html │ │ ├── pages_0.html │ │ ├── pages_1.html │ │ ├── classes_0.html │ │ ├── classes_1.html │ │ ├── classes_2.html │ │ ├── classes_3.html │ │ ├── classes_4.html │ │ ├── classes_5.html │ │ ├── classes_6.html │ │ ├── functions_0.html │ │ ├── functions_1.html │ │ ├── functions_2.html │ │ ├── functions_3.html │ │ ├── functions_4.html │ │ ├── functions_5.html │ │ ├── variables_0.html │ │ ├── variables_1.html │ │ ├── variables_2.html │ │ ├── variables_3.html │ │ ├── variables_4.html │ │ ├── variables_5.html │ │ ├── variables_6.html │ │ ├── variables_7.html │ │ ├── variables_8.html │ │ ├── variables_9.html │ │ ├── variables_a.html │ │ ├── namespaces_0.html │ │ ├── namespaces_1.html │ │ ├── functions_5.js │ │ └── all_d.js │ ├── inherit_graph_0.png │ ├── inherit_graph_1.png │ ├── inherit_graph_2.png │ ├── inherit_graph_3.png │ ├── classdns__attack_1_1DNSAttack_1_1Mode__coll__graph.map │ ├── classdns__attack_1_1DNSAttack_1_1Mode__inherit__graph.map │ ├── classdns__attack_1_1InitialQueryFailed__coll__graph.map │ ├── classdns__attack_1_1InitialQueryFailed__inherit__graph.map │ ├── classdns__attack_1_1DNSAttack_1_1CriticalError__coll__graph.map │ ├── classdns__attack_1_1DNSAttack_1_1SuccessfulAttack__coll__graph.map │ ├── classdns__attack_1_1DNSAttack_1_1SuccessfulAttack__inherit__graph.map │ ├── classdns__poisoning_1_1DNSPoisoning_1_1AttackType__coll__graph.map │ ├── classdns__poisoning_1_1DNSPoisoning_1_1AttackType__inherit__graph.map │ ├── classdns__poisoning_1_1DNSPoisoning_1_1InvalidMAC__coll__graph.map │ ├── classdns__poisoning_1_1DNSPoisoning_1_1InvalidMAC__inherit__graph.map │ ├── classhomework_1_1DNSAttack_1_1InitialQueryFailed__coll__graph.map │ ├── classhomework_1_1DNSAttack_1_1InitialQueryFailed__inherit__graph.map │ ├── classdns__attack_1_1DNSAttack_1_1Mode__coll__graph.png │ ├── classdns__attack_1_1InitialQueryFailed__coll__graph.png │ ├── classdns__attack_1_1DNSAttack_1_1Mode__inherit__graph.png │ ├── classdns__attack_1_1InitialQueryFailed__inherit__graph.png │ ├── classdns__attack_1_1DNSAttack_1_1CriticalError__coll__graph.png │ ├── classdns__attack_1_1DNSAttack_1_1NSFetchError__coll__graph.png │ ├── classdns__attack_1_1DNSAttack_1_1NSFetchError__inherit__graph.png │ ├── classhomework_1_1DNSAttack_1_1InitialQueryFailed__coll__graph.png │ ├── classdns__attack_1_1DNSAttack_1_1CriticalError__inherit__graph.png │ ├── classdns__attack_1_1DNSAttack_1_1InitialQueryFailed__coll__graph.png │ ├── classdns__attack_1_1DNSAttack_1_1InvalidAttackType__coll__graph.png │ ├── classdns__attack_1_1DNSAttack_1_1InvalidIPAddress__coll__graph.png │ ├── classdns__attack_1_1DNSAttack_1_1SuccessfulAttack__coll__graph.png │ ├── classdns__poisoning_1_1DNSPoisoning_1_1AttackType__coll__graph.png │ ├── classdns__poisoning_1_1DNSPoisoning_1_1InvalidMAC__coll__graph.png │ ├── classhomework_1_1DNSAttack_1_1InitialQueryFailed__inherit__graph.png │ ├── classdns__attack_1_1DNSAttack_1_1InvalidAttackType__inherit__graph.png │ ├── classdns__attack_1_1DNSAttack_1_1InvalidIPAddress__inherit__graph.png │ ├── classdns__attack_1_1DNSAttack_1_1SuccessfulAttack__inherit__graph.png │ ├── classdns__poisoning_1_1DNSPoisoning_1_1AttackType__inherit__graph.png │ ├── classdns__poisoning_1_1DNSPoisoning_1_1InvalidMAC__inherit__graph.png │ ├── classdns__attack_1_1DNSAttack_1_1InitialQueryFailed__inherit__graph.png │ ├── inherit_graph_0.map │ ├── inherit_graph_3.map │ ├── classdns__attack_1_1DNSAttack_1_1NSFetchError__coll__graph.map │ ├── classdns__attack_1_1DNSAttack_1_1NSFetchError__inherit__graph.map │ ├── classdns__attack_1_1DNSAttack_1_1InvalidIPAddress__coll__graph.map │ ├── classdns__attack_1_1DNSAttack_1_1InvalidAttackType__coll__graph.map │ ├── classdns__attack_1_1DNSAttack_1_1InvalidIPAddress__inherit__graph.map │ ├── classdns__attack_1_1DNSAttack_1_1InitialQueryFailed__coll__graph.map │ ├── classdns__attack_1_1DNSAttack_1_1InitialQueryFailed__inherit__graph.map │ ├── classdns__attack_1_1DNSAttack_1_1InvalidAttackType__inherit__graph.map │ ├── inherit_graph_2.map │ ├── classdns__attack_1_1DNSAttack_1_1CriticalError__inherit__graph.map │ ├── menudata.js │ ├── inherit_graph_1.map │ ├── menu.js │ ├── Mainpage.html │ ├── index.html │ ├── bug.html │ ├── pages.html │ ├── namespaceDNS__Attack.html │ ├── namespaceMain.html │ ├── dynsections.js │ ├── todo.html │ ├── namespaces.html │ ├── namespaceDNS__Poisoning.html │ ├── classdns__attack_1_1DNSAttack_1_1Mode-members.html │ ├── classdns__poisoning_1_1DNSPoisoning_1_1AttackType-members.html │ ├── classdns__attack_1_1DNSAttack_1_1SuccessfulAttack.html │ ├── classdns__poisoning_1_1DNSPoisoning_1_1InvalidMAC.html │ ├── classdns__attack_1_1InitialQueryFailed.html │ ├── classhomework_1_1DNSAttack_1_1InitialQueryFailed.html │ ├── classdns__attack_1_1DNSAttack_1_1NSFetchError.html │ ├── classdns__attack_1_1DNSAttack_1_1InitialQueryFailed.html │ ├── classdns__attack_1_1DNSAttack_1_1InvalidAttackType.html │ ├── classdns__attack_1_1DNSAttack_1_1InvalidIPAddress.html │ └── classdns__attack_1_1DNSAttack_1_1CriticalError.html ├── latex │ ├── classdns__attack_1_1InitialQueryFailed__coll__graph.md5 │ ├── classdns__attack_1_1InitialQueryFailed__inherit__graph.md5 │ ├── classdns__attack_1_1InitialQueryFailed__coll__graph.pdf │ ├── classdns__attack_1_1InitialQueryFailed__inherit__graph.pdf │ ├── namespaceDNS__Poisoning.tex │ ├── namespaceDNS__Attack.tex │ ├── hierarchy.tex │ ├── annotated.tex │ ├── namespaces.tex │ ├── Makefile │ ├── classdns__attack_1_1InitialQueryFailed.tex │ ├── classdns__poisoning_1_1DNSPoisoning.tex │ └── refman.tex ├── dnspoisoning_screen.png ├── dnspoisoning_screen_2.png └── index.html ├── .vscode └── settings.json ├── requirements.txt ├── .gitignore ├── launch.sh ├── launch_fast.sh └── README.md /docs/html/graph_legend.md5: -------------------------------------------------------------------------------- 1 | 387ff8eb65306fa251338d3c9bd7bfff -------------------------------------------------------------------------------- /docs/html/inherit_graph_0.md5: -------------------------------------------------------------------------------- 1 | 59601f1bd7aa064255e4846ff81c178e -------------------------------------------------------------------------------- /docs/html/inherit_graph_1.md5: -------------------------------------------------------------------------------- 1 | 8fdbc3419256376106ca3d756b5e2b54 -------------------------------------------------------------------------------- /docs/html/inherit_graph_2.md5: -------------------------------------------------------------------------------- 1 | ee0a890eb004b5e8cb39f782571f41cd -------------------------------------------------------------------------------- /docs/html/inherit_graph_3.md5: -------------------------------------------------------------------------------- 1 | 113002020ba0149f37602ab7559ce7cb -------------------------------------------------------------------------------- /.vscode/settings.json: -------------------------------------------------------------------------------- 1 | { 2 | "python.pythonPath": "/usr/bin/python3" 3 | } -------------------------------------------------------------------------------- /requirements.txt: -------------------------------------------------------------------------------- 1 | scapy==2.4.2 2 | blessings==1.7 3 | dnspython==1.16.0 4 | -------------------------------------------------------------------------------- /docs/html/bc_s.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/html/bc_s.png -------------------------------------------------------------------------------- /docs/html/bdwn.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/html/bdwn.png -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1DNSAttack_1_1Mode__coll__graph.md5: -------------------------------------------------------------------------------- 1 | 19c9e5c5c6a292ad078a0bff451ff69a -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1InitialQueryFailed__coll__graph.md5: -------------------------------------------------------------------------------- 1 | 6270b6d8d5f9a9d4398c5eebeca8099e -------------------------------------------------------------------------------- /docs/html/doc.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/html/doc.png -------------------------------------------------------------------------------- /docs/html/open.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/html/open.png -------------------------------------------------------------------------------- /docs/latex/classdns__attack_1_1InitialQueryFailed__coll__graph.md5: -------------------------------------------------------------------------------- 1 | ac1e38fba12c640849f6a64209184897 -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1DNSAttack_1_1Mode__inherit__graph.md5: -------------------------------------------------------------------------------- 1 | e71619ea925c168eed9010db09e3d9fa -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1InitialQueryFailed__inherit__graph.md5: -------------------------------------------------------------------------------- 1 | 6c5d308222d42d326716059fab10edf3 -------------------------------------------------------------------------------- /docs/html/closed.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/html/closed.png -------------------------------------------------------------------------------- /docs/html/nav_f.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/html/nav_f.png -------------------------------------------------------------------------------- /docs/html/nav_g.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/html/nav_g.png -------------------------------------------------------------------------------- /docs/html/nav_h.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/html/nav_h.png -------------------------------------------------------------------------------- /docs/html/tab_a.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/html/tab_a.png -------------------------------------------------------------------------------- /docs/html/tab_b.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/html/tab_b.png -------------------------------------------------------------------------------- /docs/html/tab_h.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/html/tab_h.png -------------------------------------------------------------------------------- /docs/html/tab_s.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/html/tab_s.png -------------------------------------------------------------------------------- /docs/latex/classdns__attack_1_1InitialQueryFailed__inherit__graph.md5: -------------------------------------------------------------------------------- 1 | e51507658e77450c2051a87b06ada1ab -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1DNSAttack_1_1CriticalError__coll__graph.md5: -------------------------------------------------------------------------------- 1 | cea2badcfa8808573a2ad880d1fb0ea9 -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1DNSAttack_1_1CriticalError__inherit__graph.md5: -------------------------------------------------------------------------------- 1 | fc83a532c19e7a64fc5110873d70e584 -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1DNSAttack_1_1InvalidIPAddress__coll__graph.md5: -------------------------------------------------------------------------------- 1 | 05d00d38d383c0ba688b09cba1f32f24 -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1DNSAttack_1_1NSFetchError__coll__graph.md5: -------------------------------------------------------------------------------- 1 | 13583a9112f0063f501ee1166132050d -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1DNSAttack_1_1NSFetchError__inherit__graph.md5: -------------------------------------------------------------------------------- 1 | 86e50d437c2911ad2d1a15e599c53d41 -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1DNSAttack_1_1SuccessfulAttack__coll__graph.md5: -------------------------------------------------------------------------------- 1 | cf44287b494f67f52751ab34baffd761 -------------------------------------------------------------------------------- /docs/html/classdns__poisoning_1_1DNSPoisoning_1_1AttackType__coll__graph.md5: -------------------------------------------------------------------------------- 1 | 0b8ebf897a4279bccb5b1f0aee015494 -------------------------------------------------------------------------------- /docs/html/classdns__poisoning_1_1DNSPoisoning_1_1InvalidMAC__coll__graph.md5: -------------------------------------------------------------------------------- 1 | 119c61205134513615fc6b02b41fe09b -------------------------------------------------------------------------------- /docs/html/classhomework_1_1DNSAttack_1_1InitialQueryFailed__coll__graph.md5: -------------------------------------------------------------------------------- 1 | 367ca1cfa56fdf7328d9df64fc309295 -------------------------------------------------------------------------------- /docs/html/doxygen.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/html/doxygen.png -------------------------------------------------------------------------------- /docs/html/splitbar.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/html/splitbar.png -------------------------------------------------------------------------------- /docs/html/sync_off.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/html/sync_off.png -------------------------------------------------------------------------------- /docs/html/sync_on.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/html/sync_on.png -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1DNSAttack_1_1InitialQueryFailed__coll__graph.md5: -------------------------------------------------------------------------------- 1 | d84555c8e7fac6c2d0bad54fd56a76be -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1DNSAttack_1_1InitialQueryFailed__inherit__graph.md5: -------------------------------------------------------------------------------- 1 | 9fcd168da2153945be736adba92f0c15 -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1DNSAttack_1_1InvalidAttackType__coll__graph.md5: -------------------------------------------------------------------------------- 1 | d2c4d53a3c18b0f872c3120a85cf59c5 -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1DNSAttack_1_1InvalidAttackType__inherit__graph.md5: -------------------------------------------------------------------------------- 1 | bcfecc5ca69ed9555b4120c265dbebfa -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1DNSAttack_1_1InvalidIPAddress__inherit__graph.md5: -------------------------------------------------------------------------------- 1 | c07658c04fff97eb0e7701fee778b40f -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1DNSAttack_1_1SuccessfulAttack__inherit__graph.md5: -------------------------------------------------------------------------------- 1 | 23c915c9fba717a7c28366f7abe52eba -------------------------------------------------------------------------------- /docs/html/classdns__poisoning_1_1DNSPoisoning_1_1AttackType__inherit__graph.md5: -------------------------------------------------------------------------------- 1 | 889cb106fe69091a6a63647335375a58 -------------------------------------------------------------------------------- /docs/html/classdns__poisoning_1_1DNSPoisoning_1_1InvalidMAC__inherit__graph.md5: -------------------------------------------------------------------------------- 1 | 25510dd7cfa164912aa4dc318bb2c8c3 -------------------------------------------------------------------------------- /docs/html/classhomework_1_1DNSAttack_1_1InitialQueryFailed__inherit__graph.md5: -------------------------------------------------------------------------------- 1 | ff395e11e447b18432222bce7f2b8283 -------------------------------------------------------------------------------- /docs/html/folderopen.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/html/folderopen.png -------------------------------------------------------------------------------- /docs/dnspoisoning_screen.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/dnspoisoning_screen.png -------------------------------------------------------------------------------- /docs/html/folderclosed.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/html/folderclosed.png -------------------------------------------------------------------------------- /docs/html/graph_legend.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/html/graph_legend.png -------------------------------------------------------------------------------- /docs/html/search/close.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/html/search/close.png -------------------------------------------------------------------------------- /docs/html/search/mag_sel.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/html/search/mag_sel.png -------------------------------------------------------------------------------- /docs/html/search/pages_0.js: -------------------------------------------------------------------------------- 1 | var searchData= 2 | [ 3 | ['todo_20list',['Todo List',['../todo.html',1,'']]] 4 | ]; 5 | -------------------------------------------------------------------------------- /docs/html/search/pages_1.js: -------------------------------------------------------------------------------- 1 | var searchData= 2 | [ 3 | ['todo_20list',['Todo List',['../todo.html',1,'']]] 4 | ]; 5 | -------------------------------------------------------------------------------- /docs/dnspoisoning_screen_2.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/dnspoisoning_screen_2.png -------------------------------------------------------------------------------- /docs/html/inherit_graph_0.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/html/inherit_graph_0.png -------------------------------------------------------------------------------- /docs/html/inherit_graph_1.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/html/inherit_graph_1.png -------------------------------------------------------------------------------- /docs/html/inherit_graph_2.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/html/inherit_graph_2.png -------------------------------------------------------------------------------- /docs/html/inherit_graph_3.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/html/inherit_graph_3.png -------------------------------------------------------------------------------- /docs/html/search/namespaces_1.js: -------------------------------------------------------------------------------- 1 | var searchData= 2 | [ 3 | ['main',['Main',['../namespaceMain.html',1,'']]] 4 | ]; 5 | -------------------------------------------------------------------------------- /docs/html/search/search_l.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/html/search/search_l.png -------------------------------------------------------------------------------- /docs/html/search/search_m.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/html/search/search_m.png -------------------------------------------------------------------------------- /docs/html/search/search_r.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/html/search/search_r.png -------------------------------------------------------------------------------- /docs/index.html: -------------------------------------------------------------------------------- 1 | -------------------------------------------------------------------------------- /.gitignore: -------------------------------------------------------------------------------- 1 | 2 | __pycache__/ 3 | .vscode/ 4 | share/ 5 | lib/ 6 | lib64/ 7 | pyvenc.cfg 8 | include/ 9 | bin/ 10 | .gitignore 11 | -------------------------------------------------------------------------------- /docs/html/search/namespaces_0.js: -------------------------------------------------------------------------------- 1 | var searchData= 2 | [ 3 | ['dns_5fattack',['DNS_Attack',['../namespaceDNS__Attack.html',1,'']]] 4 | ]; 5 | -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1DNSAttack_1_1Mode__coll__graph.map: -------------------------------------------------------------------------------- 1 | 2 | 3 | -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1DNSAttack_1_1Mode__inherit__graph.map: -------------------------------------------------------------------------------- 1 | 2 | 3 | -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1InitialQueryFailed__coll__graph.map: -------------------------------------------------------------------------------- 1 | 2 | 3 | -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1InitialQueryFailed__inherit__graph.map: -------------------------------------------------------------------------------- 1 | 2 | 3 | -------------------------------------------------------------------------------- /docs/html/search/classes_4.js: -------------------------------------------------------------------------------- 1 | var searchData= 2 | [ 3 | ['mode',['Mode',['../classdns__attack_1_1DNSAttack_1_1Mode.html',1,'dns_attack::DNSAttack']]] 4 | ]; 5 | -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1DNSAttack_1_1CriticalError__coll__graph.map: -------------------------------------------------------------------------------- 1 | 2 | 3 | -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1DNSAttack_1_1SuccessfulAttack__coll__graph.map: -------------------------------------------------------------------------------- 1 | 2 | 3 | -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1DNSAttack_1_1SuccessfulAttack__inherit__graph.map: -------------------------------------------------------------------------------- 1 | 2 | 3 | -------------------------------------------------------------------------------- /docs/html/classdns__poisoning_1_1DNSPoisoning_1_1AttackType__coll__graph.map: -------------------------------------------------------------------------------- 1 | 2 | 3 | -------------------------------------------------------------------------------- /docs/html/classdns__poisoning_1_1DNSPoisoning_1_1AttackType__inherit__graph.map: -------------------------------------------------------------------------------- 1 | 2 | 3 | -------------------------------------------------------------------------------- /docs/html/classdns__poisoning_1_1DNSPoisoning_1_1InvalidMAC__coll__graph.map: -------------------------------------------------------------------------------- 1 | 2 | 3 | -------------------------------------------------------------------------------- /docs/html/classdns__poisoning_1_1DNSPoisoning_1_1InvalidMAC__inherit__graph.map: -------------------------------------------------------------------------------- 1 | 2 | 3 | -------------------------------------------------------------------------------- /docs/html/classhomework_1_1DNSAttack_1_1InitialQueryFailed__coll__graph.map: -------------------------------------------------------------------------------- 1 | 2 | 3 | -------------------------------------------------------------------------------- /docs/html/classhomework_1_1DNSAttack_1_1InitialQueryFailed__inherit__graph.map: -------------------------------------------------------------------------------- 1 | 2 | 3 | -------------------------------------------------------------------------------- /docs/html/search/classes_5.js: -------------------------------------------------------------------------------- 1 | var searchData= 2 | [ 3 | ['nsfetcherror',['NSFetchError',['../classdns__attack_1_1DNSAttack_1_1NSFetchError.html',1,'dns_attack::DNSAttack']]] 4 | ]; 5 | -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1DNSAttack_1_1Mode__coll__graph.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/html/classdns__attack_1_1DNSAttack_1_1Mode__coll__graph.png -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1InitialQueryFailed__coll__graph.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/html/classdns__attack_1_1InitialQueryFailed__coll__graph.png -------------------------------------------------------------------------------- /docs/html/search/classes_0.js: -------------------------------------------------------------------------------- 1 | var searchData= 2 | [ 3 | ['attacktype',['AttackType',['../classdns__poisoning_1_1DNSPoisoning_1_1AttackType.html',1,'dns_poisoning::DNSPoisoning']]] 4 | ]; 5 | -------------------------------------------------------------------------------- /docs/html/search/classes_1.js: -------------------------------------------------------------------------------- 1 | var searchData= 2 | [ 3 | ['criticalerror',['CriticalError',['../classdns__attack_1_1DNSAttack_1_1CriticalError.html',1,'dns_attack::DNSAttack']]] 4 | ]; 5 | -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1DNSAttack_1_1Mode__inherit__graph.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/html/classdns__attack_1_1DNSAttack_1_1Mode__inherit__graph.png -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1InitialQueryFailed__inherit__graph.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/html/classdns__attack_1_1InitialQueryFailed__inherit__graph.png -------------------------------------------------------------------------------- /docs/html/search/classes_6.js: -------------------------------------------------------------------------------- 1 | var searchData= 2 | [ 3 | ['successfulattack',['SuccessfulAttack',['../classdns__attack_1_1DNSAttack_1_1SuccessfulAttack.html',1,'dns_attack::DNSAttack']]] 4 | ]; 5 | -------------------------------------------------------------------------------- /docs/latex/classdns__attack_1_1InitialQueryFailed__coll__graph.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/latex/classdns__attack_1_1InitialQueryFailed__coll__graph.pdf -------------------------------------------------------------------------------- /docs/html/search/variables_9.js: -------------------------------------------------------------------------------- 1 | var searchData= 2 | [ 3 | ['ttl',['ttl',['../classdns__poisoning_1_1DNSPoisoning.html#a3d11bc7dacd26234e0dab3a2369d7711',1,'dns_poisoning::DNSPoisoning']]] 4 | ]; 5 | -------------------------------------------------------------------------------- /docs/latex/classdns__attack_1_1InitialQueryFailed__inherit__graph.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/latex/classdns__attack_1_1InitialQueryFailed__inherit__graph.pdf -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1DNSAttack_1_1CriticalError__coll__graph.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/html/classdns__attack_1_1DNSAttack_1_1CriticalError__coll__graph.png -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1DNSAttack_1_1NSFetchError__coll__graph.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/html/classdns__attack_1_1DNSAttack_1_1NSFetchError__coll__graph.png -------------------------------------------------------------------------------- /docs/html/search/variables_3.js: -------------------------------------------------------------------------------- 1 | var searchData= 2 | [ 3 | ['fast',['FAST',['../classdns__attack_1_1DNSAttack_1_1Mode.html#a7de52c622511a5fd41e3682ada3ace0c',1,'dns_attack::DNSAttack::Mode']]] 4 | ]; 5 | -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1DNSAttack_1_1NSFetchError__inherit__graph.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/html/classdns__attack_1_1DNSAttack_1_1NSFetchError__inherit__graph.png -------------------------------------------------------------------------------- /docs/html/classhomework_1_1DNSAttack_1_1InitialQueryFailed__coll__graph.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/html/classhomework_1_1DNSAttack_1_1InitialQueryFailed__coll__graph.png -------------------------------------------------------------------------------- /docs/html/search/all_b.js: -------------------------------------------------------------------------------- 1 | var searchData= 2 | [ 3 | ['open_5fsocket',['open_socket',['../classdns__poisoning_1_1DNSPoisoning.html#abd71b87190582b47006ea5f44554766a',1,'dns_poisoning::DNSPoisoning']]] 4 | ]; 5 | -------------------------------------------------------------------------------- /docs/html/search/all_c.js: -------------------------------------------------------------------------------- 1 | var searchData= 2 | [ 3 | ['random_5furl',['random_url',['../classdns__poisoning_1_1DNSPoisoning.html#a644377ab26bf8c1a546fa45988edffaa',1,'dns_poisoning::DNSPoisoning']]] 4 | ]; 5 | -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1DNSAttack_1_1CriticalError__inherit__graph.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/html/classdns__attack_1_1DNSAttack_1_1CriticalError__inherit__graph.png -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1DNSAttack_1_1InitialQueryFailed__coll__graph.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/html/classdns__attack_1_1DNSAttack_1_1InitialQueryFailed__coll__graph.png -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1DNSAttack_1_1InvalidAttackType__coll__graph.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/html/classdns__attack_1_1DNSAttack_1_1InvalidAttackType__coll__graph.png -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1DNSAttack_1_1InvalidIPAddress__coll__graph.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/html/classdns__attack_1_1DNSAttack_1_1InvalidIPAddress__coll__graph.png -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1DNSAttack_1_1SuccessfulAttack__coll__graph.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/html/classdns__attack_1_1DNSAttack_1_1SuccessfulAttack__coll__graph.png -------------------------------------------------------------------------------- /docs/html/classdns__poisoning_1_1DNSPoisoning_1_1AttackType__coll__graph.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/html/classdns__poisoning_1_1DNSPoisoning_1_1AttackType__coll__graph.png -------------------------------------------------------------------------------- /docs/html/classdns__poisoning_1_1DNSPoisoning_1_1InvalidMAC__coll__graph.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/html/classdns__poisoning_1_1DNSPoisoning_1_1InvalidMAC__coll__graph.png -------------------------------------------------------------------------------- /docs/html/classhomework_1_1DNSAttack_1_1InitialQueryFailed__inherit__graph.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/html/classhomework_1_1DNSAttack_1_1InitialQueryFailed__inherit__graph.png -------------------------------------------------------------------------------- /docs/html/search/all_9.js: -------------------------------------------------------------------------------- 1 | var searchData= 2 | [ 3 | ['main',['Main',['../namespaceMain.html',1,'']]], 4 | ['mode',['Mode',['../classdns__attack_1_1DNSAttack_1_1Mode.html',1,'dns_attack::DNSAttack']]] 5 | ]; 6 | -------------------------------------------------------------------------------- /docs/html/search/functions_4.js: -------------------------------------------------------------------------------- 1 | var searchData= 2 | [ 3 | ['open_5fsocket',['open_socket',['../classdns__poisoning_1_1DNSPoisoning.html#abd71b87190582b47006ea5f44554766a',1,'dns_poisoning::DNSPoisoning']]] 4 | ]; 5 | -------------------------------------------------------------------------------- /docs/html/search/variables_7.js: -------------------------------------------------------------------------------- 1 | var searchData= 2 | [ 3 | ['random_5furl',['random_url',['../classdns__poisoning_1_1DNSPoisoning.html#a644377ab26bf8c1a546fa45988edffaa',1,'dns_poisoning::DNSPoisoning']]] 4 | ]; 5 | -------------------------------------------------------------------------------- /launch.sh: -------------------------------------------------------------------------------- 1 | #!/bin/bash 2 | sudo python3 main.py -t "bankofallan.co.uk" -a "192.168.56.1" -v "192.168.56.3" -ns "10.0.0.1" -m "NORMAL" -bs "192.168.56.1" -bp 55553 -bd "badguy.ru" -i "vboxnet0" -vb 1 -at "NORMAL" 3 | -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1DNSAttack_1_1InvalidAttackType__inherit__graph.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/html/classdns__attack_1_1DNSAttack_1_1InvalidAttackType__inherit__graph.png -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1DNSAttack_1_1InvalidIPAddress__inherit__graph.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/html/classdns__attack_1_1DNSAttack_1_1InvalidIPAddress__inherit__graph.png -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1DNSAttack_1_1SuccessfulAttack__inherit__graph.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/html/classdns__attack_1_1DNSAttack_1_1SuccessfulAttack__inherit__graph.png -------------------------------------------------------------------------------- /docs/html/classdns__poisoning_1_1DNSPoisoning_1_1AttackType__inherit__graph.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/html/classdns__poisoning_1_1DNSPoisoning_1_1AttackType__inherit__graph.png -------------------------------------------------------------------------------- /docs/html/classdns__poisoning_1_1DNSPoisoning_1_1InvalidMAC__inherit__graph.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/html/classdns__poisoning_1_1DNSPoisoning_1_1InvalidMAC__inherit__graph.png -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1DNSAttack_1_1InitialQueryFailed__inherit__graph.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gr3yc4t/dns-poisoning-tool/HEAD/docs/html/classdns__attack_1_1DNSAttack_1_1InitialQueryFailed__inherit__graph.png -------------------------------------------------------------------------------- /docs/html/search/functions_2.js: -------------------------------------------------------------------------------- 1 | var searchData= 2 | [ 3 | ['faster_5fflooding',['faster_flooding',['../classdns__poisoning_1_1DNSPoisoning.html#a5b88cb0469db0817033e43088f6c17fd',1,'dns_poisoning::DNSPoisoning']]] 4 | ]; 5 | -------------------------------------------------------------------------------- /docs/html/search/variables_4.js: -------------------------------------------------------------------------------- 1 | var searchData= 2 | [ 3 | ['interrupt_5fhandler',['interrupt_handler',['../classdns__poisoning_1_1DNSPoisoning.html#a9c8aa320d6ae14df500e4e04cf5f0881',1,'dns_poisoning::DNSPoisoning']]] 4 | ]; 5 | -------------------------------------------------------------------------------- /launch_fast.sh: -------------------------------------------------------------------------------- 1 | #!/bin/bash 2 | sudo python3 main.py -t "bankofallan.co.uk" -a "192.168.56.1" -v "192.168.56.3" -ns "10.0.0.1" -m "FAST" -vm "08:00:27:be:48:1d" -bs "192.168.56.1" -bp 55553 -bd "badguy.ru" -i "vboxnet0" -vb 1 -at "NORMAL" 3 | -------------------------------------------------------------------------------- /docs/html/search/all_e.js: -------------------------------------------------------------------------------- 1 | var searchData= 2 | [ 3 | ['todo_20list',['Todo List',['../todo.html',1,'']]], 4 | ['ttl',['ttl',['../classdns__poisoning_1_1DNSPoisoning.html#a3d11bc7dacd26234e0dab3a2369d7711',1,'dns_poisoning::DNSPoisoning']]] 5 | ]; 6 | -------------------------------------------------------------------------------- /docs/html/search/classes_2.js: -------------------------------------------------------------------------------- 1 | var searchData= 2 | [ 3 | ['dnsattack',['DNSAttack',['../classdns__attack_1_1DNSAttack.html',1,'dns_attack']]], 4 | ['dnspoisoning',['DNSPoisoning',['../classdns__poisoning_1_1DNSPoisoning.html',1,'dns_poisoning']]] 5 | ]; 6 | -------------------------------------------------------------------------------- /docs/html/inherit_graph_0.map: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | -------------------------------------------------------------------------------- /docs/html/inherit_graph_3.map: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | -------------------------------------------------------------------------------- /docs/html/search/all_8.js: -------------------------------------------------------------------------------- 1 | var searchData= 2 | [ 3 | ['log',['log',['../classdns__attack_1_1DNSAttack.html#a74f5736228981dac0dca713508b0e995',1,'dns_attack.DNSAttack.log()'],['../classdns__poisoning_1_1DNSPoisoning.html#ad3a9cdfed9445196223af306ef932230',1,'dns_poisoning.DNSPoisoning.log()']]] 4 | ]; 5 | -------------------------------------------------------------------------------- /docs/html/search/variables_5.js: -------------------------------------------------------------------------------- 1 | var searchData= 2 | [ 3 | ['log',['log',['../classdns__attack_1_1DNSAttack.html#a74f5736228981dac0dca713508b0e995',1,'dns_attack.DNSAttack.log()'],['../classdns__poisoning_1_1DNSPoisoning.html#ad3a9cdfed9445196223af306ef932230',1,'dns_poisoning.DNSPoisoning.log()']]] 4 | ]; 5 | -------------------------------------------------------------------------------- /docs/html/search/all_0.js: -------------------------------------------------------------------------------- 1 | var searchData= 2 | [ 3 | ['_5f_5finit_5f_5f',['__init__',['../classdns__attack_1_1DNSAttack.html#afbfd871ee7ec8dd48de0dd7bac86d302',1,'dns_attack.DNSAttack.__init__()'],['../classdns__poisoning_1_1DNSPoisoning.html#a705af864438995c30b179e7951fd974a',1,'dns_poisoning.DNSPoisoning.__init__()']]] 4 | ]; 5 | -------------------------------------------------------------------------------- /docs/html/search/functions_0.js: -------------------------------------------------------------------------------- 1 | var searchData= 2 | [ 3 | ['_5f_5finit_5f_5f',['__init__',['../classdns__attack_1_1DNSAttack.html#afbfd871ee7ec8dd48de0dd7bac86d302',1,'dns_attack.DNSAttack.__init__()'],['../classdns__poisoning_1_1DNSPoisoning.html#a705af864438995c30b179e7951fd974a',1,'dns_poisoning.DNSPoisoning.__init__()']]] 4 | ]; 5 | -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1DNSAttack_1_1NSFetchError__coll__graph.map: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1DNSAttack_1_1NSFetchError__inherit__graph.map: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1DNSAttack_1_1InvalidIPAddress__coll__graph.map: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | -------------------------------------------------------------------------------- /docs/html/search/all_f.js: -------------------------------------------------------------------------------- 1 | var searchData= 2 | [ 3 | ['victim_5fmac',['victim_mac',['../classdns__attack_1_1DNSAttack.html#a965d51d4b608a26414e90f52da888f7f',1,'dns_attack::DNSAttack']]], 4 | ['victim_5fserver',['victim_server',['../classdns__poisoning_1_1DNSPoisoning.html#a7ddda8f8750a3f6be247ba0aa2ae62da',1,'dns_poisoning::DNSPoisoning']]] 5 | ]; 6 | -------------------------------------------------------------------------------- /docs/html/search/variables_2.js: -------------------------------------------------------------------------------- 1 | var searchData= 2 | [ 3 | ['dan',['DAN',['../classdns__poisoning_1_1DNSPoisoning_1_1AttackType.html#a13dd30d13ac1836566d3ef97229b99ec',1,'dns_poisoning::DNSPoisoning::AttackType']]], 4 | ['domain',['domain',['../classdns__attack_1_1DNSAttack.html#a2a6e6d32a14c8de84e25c7f071084e7d',1,'dns_attack::DNSAttack']]] 5 | ]; 6 | -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1DNSAttack_1_1InvalidAttackType__coll__graph.map: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1DNSAttack_1_1InvalidIPAddress__inherit__graph.map: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | -------------------------------------------------------------------------------- /docs/html/search/all_5.js: -------------------------------------------------------------------------------- 1 | var searchData= 2 | [ 3 | ['fast',['FAST',['../classdns__attack_1_1DNSAttack_1_1Mode.html#a7de52c622511a5fd41e3682ada3ace0c',1,'dns_attack::DNSAttack::Mode']]], 4 | ['faster_5fflooding',['faster_flooding',['../classdns__poisoning_1_1DNSPoisoning.html#a5b88cb0469db0817033e43088f6c17fd',1,'dns_poisoning::DNSPoisoning']]] 5 | ]; 6 | -------------------------------------------------------------------------------- /docs/html/search/variables_a.js: -------------------------------------------------------------------------------- 1 | var searchData= 2 | [ 3 | ['victim_5fmac',['victim_mac',['../classdns__attack_1_1DNSAttack.html#a965d51d4b608a26414e90f52da888f7f',1,'dns_attack::DNSAttack']]], 4 | ['victim_5fserver',['victim_server',['../classdns__poisoning_1_1DNSPoisoning.html#a7ddda8f8750a3f6be247ba0aa2ae62da',1,'dns_poisoning::DNSPoisoning']]] 5 | ]; 6 | -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1DNSAttack_1_1InitialQueryFailed__coll__graph.map: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1DNSAttack_1_1InitialQueryFailed__inherit__graph.map: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1DNSAttack_1_1InvalidAttackType__inherit__graph.map: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | -------------------------------------------------------------------------------- /docs/html/search/functions_1.js: -------------------------------------------------------------------------------- 1 | var searchData= 2 | [ 3 | ['check_5fpoisoning',['check_poisoning',['../classdns__attack_1_1DNSAttack.html#a6311d646d23a4350d3a2ffa56816d306',1,'dns_attack::DNSAttack']]], 4 | ['create_5fsocket',['create_socket',['../classdns__poisoning_1_1DNSPoisoning.html#a429a52b36eab4711850c5e67aa8785f8',1,'dns_poisoning::DNSPoisoning']]] 5 | ]; 6 | -------------------------------------------------------------------------------- /docs/html/inherit_graph_2.map: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | -------------------------------------------------------------------------------- /docs/latex/namespaceDNS__Poisoning.tex: -------------------------------------------------------------------------------- 1 | \hypertarget{namespaceDNS__Poisoning}{}\section{D\+N\+S\+\_\+\+Poisoning Namespace Reference} 2 | \label{namespaceDNS__Poisoning}\index{D\+N\+S\+\_\+\+Poisoning@{D\+N\+S\+\_\+\+Poisoning}} 3 | 4 | 5 | This package includes all function to execute the poisoning attack. 6 | 7 | 8 | 9 | 10 | \subsection{Detailed Description} 11 | This package includes all function to execute the poisoning attack. -------------------------------------------------------------------------------- /docs/latex/namespaceDNS__Attack.tex: -------------------------------------------------------------------------------- 1 | \hypertarget{namespaceDNS__Attack}{}\section{D\+N\+S\+\_\+\+Attack Namespace Reference} 2 | \label{namespaceDNS__Attack}\index{D\+N\+S\+\_\+\+Attack@{D\+N\+S\+\_\+\+Attack}} 3 | 4 | 5 | This package is responsible to execute all the passage required for the attack. 6 | 7 | 8 | 9 | 10 | \subsection{Detailed Description} 11 | This package is responsible to execute all the passage required for the attack. -------------------------------------------------------------------------------- /docs/html/search/all_2.js: -------------------------------------------------------------------------------- 1 | var searchData= 2 | [ 3 | ['bad_5fdomain',['bad_domain',['../classdns__attack_1_1DNSAttack.html#ae7ebfd2135a524378b145e11fd7024a0',1,'dns_attack::DNSAttack']]], 4 | ['bad_5fudp_5fip',['bad_udp_ip',['../classdns__attack_1_1DNSAttack.html#a717eee68d7b112742663b35564989539',1,'dns_attack::DNSAttack']]], 5 | ['bad_5fudp_5fport',['bad_udp_port',['../classdns__attack_1_1DNSAttack.html#ac6b322e114c263150ac2810a4e7bb545',1,'dns_attack::DNSAttack']]] 6 | ]; 7 | -------------------------------------------------------------------------------- /docs/html/search/all_3.js: -------------------------------------------------------------------------------- 1 | var searchData= 2 | [ 3 | ['check_5fpoisoning',['check_poisoning',['../classdns__attack_1_1DNSAttack.html#a6311d646d23a4350d3a2ffa56816d306',1,'dns_attack::DNSAttack']]], 4 | ['create_5fsocket',['create_socket',['../classdns__poisoning_1_1DNSPoisoning.html#a429a52b36eab4711850c5e67aa8785f8',1,'dns_poisoning::DNSPoisoning']]], 5 | ['criticalerror',['CriticalError',['../classdns__attack_1_1DNSAttack_1_1CriticalError.html',1,'dns_attack::DNSAttack']]] 6 | ]; 7 | -------------------------------------------------------------------------------- /docs/html/search/variables_1.js: -------------------------------------------------------------------------------- 1 | var searchData= 2 | [ 3 | ['bad_5fdomain',['bad_domain',['../classdns__attack_1_1DNSAttack.html#ae7ebfd2135a524378b145e11fd7024a0',1,'dns_attack::DNSAttack']]], 4 | ['bad_5fudp_5fip',['bad_udp_ip',['../classdns__attack_1_1DNSAttack.html#a717eee68d7b112742663b35564989539',1,'dns_attack::DNSAttack']]], 5 | ['bad_5fudp_5fport',['bad_udp_port',['../classdns__attack_1_1DNSAttack.html#ac6b322e114c263150ac2810a4e7bb545',1,'dns_attack::DNSAttack']]] 6 | ]; 7 | -------------------------------------------------------------------------------- /docs/latex/hierarchy.tex: -------------------------------------------------------------------------------- 1 | \section{Class Hierarchy} 2 | This inheritance list is sorted roughly, but not completely, alphabetically\+:\begin{DoxyCompactList} 3 | \item \contentsline{section}{dns\+\_\+poisoning.\+D\+N\+S\+Poisoning}{\pageref{classdns__poisoning_1_1DNSPoisoning}}{} 4 | \item Exception\begin{DoxyCompactList} 5 | \item \contentsline{section}{dns\+\_\+attack.\+Initial\+Query\+Failed}{\pageref{classdns__attack_1_1InitialQueryFailed}}{} 6 | \end{DoxyCompactList} 7 | \end{DoxyCompactList} 8 | -------------------------------------------------------------------------------- /docs/latex/annotated.tex: -------------------------------------------------------------------------------- 1 | \section{Class List} 2 | Here are the classes, structs, unions and interfaces with brief descriptions\+:\begin{DoxyCompactList} 3 | \item\contentsline{section}{\hyperlink{classdns__poisoning_1_1DNSPoisoning}{dns\+\_\+poisoning.\+D\+N\+S\+Poisoning} }{\pageref{classdns__poisoning_1_1DNSPoisoning}}{} 4 | \item\contentsline{section}{\hyperlink{classdns__attack_1_1InitialQueryFailed}{dns\+\_\+attack.\+Initial\+Query\+Failed} }{\pageref{classdns__attack_1_1InitialQueryFailed}}{} 5 | \end{DoxyCompactList} 6 | -------------------------------------------------------------------------------- /docs/html/search/nomatches.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 |
9 |
No Matches
10 |
11 | 12 | 13 | -------------------------------------------------------------------------------- /docs/html/search/searchdata.js: -------------------------------------------------------------------------------- 1 | var indexSectionsWithContent = 2 | { 3 | 0: "_abcdfgilmnorstv", 4 | 1: "acdimns", 5 | 2: "dm", 6 | 3: "_cfgos", 7 | 4: "abdfilnrstv", 8 | 5: "t" 9 | }; 10 | 11 | var indexSectionNames = 12 | { 13 | 0: "all", 14 | 1: "classes", 15 | 2: "namespaces", 16 | 3: "functions", 17 | 4: "variables", 18 | 5: "pages" 19 | }; 20 | 21 | var indexSectionLabels = 22 | { 23 | 0: "All", 24 | 1: "Classes", 25 | 2: "Namespaces", 26 | 3: "Functions", 27 | 4: "Variables", 28 | 5: "Pages" 29 | }; 30 | 31 | -------------------------------------------------------------------------------- /docs/latex/namespaces.tex: -------------------------------------------------------------------------------- 1 | \section{Namespace List} 2 | Here is a list of all documented namespaces with brief descriptions\+:\begin{DoxyCompactList} 3 | \item\contentsline{section}{\hyperlink{namespaceDNS__Attack}{D\+N\+S\+\_\+\+Attack} \\*This package is responsible to execute all the passage required for the attack }{\pageref{namespaceDNS__Attack}}{} 4 | \item\contentsline{section}{\hyperlink{namespaceDNS__Poisoning}{D\+N\+S\+\_\+\+Poisoning} \\*This package includes all function to execute the poisoning attack }{\pageref{namespaceDNS__Poisoning}}{} 5 | \end{DoxyCompactList} 6 | -------------------------------------------------------------------------------- /docs/html/search/classes_3.js: -------------------------------------------------------------------------------- 1 | var searchData= 2 | [ 3 | ['initialqueryfailed',['InitialQueryFailed',['../classdns__attack_1_1DNSAttack_1_1InitialQueryFailed.html',1,'dns_attack::DNSAttack']]], 4 | ['invalidattacktype',['InvalidAttackType',['../classdns__attack_1_1DNSAttack_1_1InvalidAttackType.html',1,'dns_attack::DNSAttack']]], 5 | ['invalidipaddress',['InvalidIPAddress',['../classdns__attack_1_1DNSAttack_1_1InvalidIPAddress.html',1,'dns_attack::DNSAttack']]], 6 | ['invalidmac',['InvalidMAC',['../classdns__poisoning_1_1DNSPoisoning_1_1InvalidMAC.html',1,'dns_poisoning::DNSPoisoning']]] 7 | ]; 8 | -------------------------------------------------------------------------------- /docs/html/search/all_4.js: -------------------------------------------------------------------------------- 1 | var searchData= 2 | [ 3 | ['dan',['DAN',['../classdns__poisoning_1_1DNSPoisoning_1_1AttackType.html#a13dd30d13ac1836566d3ef97229b99ec',1,'dns_poisoning::DNSPoisoning::AttackType']]], 4 | ['dns_5fattack',['DNS_Attack',['../namespaceDNS__Attack.html',1,'']]], 5 | ['dnsattack',['DNSAttack',['../classdns__attack_1_1DNSAttack.html',1,'dns_attack']]], 6 | ['dnspoisoning',['DNSPoisoning',['../classdns__poisoning_1_1DNSPoisoning.html',1,'dns_poisoning']]], 7 | ['domain',['domain',['../classdns__attack_1_1DNSAttack.html#a2a6e6d32a14c8de84e25c7f071084e7d',1,'dns_attack::DNSAttack']]] 8 | ]; 9 | -------------------------------------------------------------------------------- /docs/latex/Makefile: -------------------------------------------------------------------------------- 1 | all: refman.pdf 2 | 3 | pdf: refman.pdf 4 | 5 | refman.pdf: clean refman.tex 6 | pdflatex refman 7 | makeindex refman.idx 8 | pdflatex refman 9 | latex_count=8 ; \ 10 | while egrep -s 'Rerun (LaTeX|to get cross-references right)' refman.log && [ $$latex_count -gt 0 ] ;\ 11 | do \ 12 | echo "Rerunning latex...." ;\ 13 | pdflatex refman ;\ 14 | latex_count=`expr $$latex_count - 1` ;\ 15 | done 16 | makeindex refman.idx 17 | pdflatex refman 18 | 19 | 20 | clean: 21 | rm -f *.ps *.dvi *.aux *.toc *.idx *.ind *.ilg *.log *.out *.brf *.blg *.bbl refman.pdf 22 | -------------------------------------------------------------------------------- /docs/html/search/variables_6.js: -------------------------------------------------------------------------------- 1 | var searchData= 2 | [ 3 | ['nic_5finterface',['nic_interface',['../classdns__attack_1_1DNSAttack.html#a3c814016d291aa3d4635c8964ba79f8a',1,'dns_attack.DNSAttack.nic_interface()'],['../classdns__poisoning_1_1DNSPoisoning.html#ad93385ef31024e556a14abdca1dffed7',1,'dns_poisoning.DNSPoisoning.nic_interface()']]], 4 | ['normal',['NORMAL',['../classdns__attack_1_1DNSAttack_1_1Mode.html#a7183027ce8667672ea4e4a4d2401befa',1,'dns_attack.DNSAttack.Mode.NORMAL()'],['../classdns__poisoning_1_1DNSPoisoning_1_1AttackType.html#a2401b53573200692044168f09c1b29f4',1,'dns_poisoning.DNSPoisoning.AttackType.NORMAL()']]] 5 | ]; 6 | -------------------------------------------------------------------------------- /docs/html/search/all_6.js: -------------------------------------------------------------------------------- 1 | var searchData= 2 | [ 3 | ['get_5fauthoritative_5fserver',['get_authoritative_server',['../classdns__attack_1_1DNSAttack.html#a331220b48e1a84dbd156426aaa58d543',1,'dns_attack::DNSAttack']]], 4 | ['get_5fclassical_5fresponse',['get_classical_response',['../classdns__poisoning_1_1DNSPoisoning.html#ac4150d8575e36ec1b76088e00d2dcacc',1,'dns_poisoning::DNSPoisoning']]], 5 | ['get_5fdan_5fresponse',['get_dan_response',['../classdns__poisoning_1_1DNSPoisoning.html#a15d953486c6c217cd05882eeb8626138',1,'dns_poisoning::DNSPoisoning']]], 6 | ['get_5fserver_5fdata',['get_server_data',['../classdns__attack_1_1DNSAttack.html#ab4f1cacfe4674a0ce9542ba0286fbe44',1,'dns_attack::DNSAttack']]] 7 | ]; 8 | -------------------------------------------------------------------------------- /docs/html/search/functions_3.js: -------------------------------------------------------------------------------- 1 | var searchData= 2 | [ 3 | ['get_5fauthoritative_5fserver',['get_authoritative_server',['../classdns__attack_1_1DNSAttack.html#a331220b48e1a84dbd156426aaa58d543',1,'dns_attack::DNSAttack']]], 4 | ['get_5fclassical_5fresponse',['get_classical_response',['../classdns__poisoning_1_1DNSPoisoning.html#ac4150d8575e36ec1b76088e00d2dcacc',1,'dns_poisoning::DNSPoisoning']]], 5 | ['get_5fdan_5fresponse',['get_dan_response',['../classdns__poisoning_1_1DNSPoisoning.html#a15d953486c6c217cd05882eeb8626138',1,'dns_poisoning::DNSPoisoning']]], 6 | ['get_5fserver_5fdata',['get_server_data',['../classdns__attack_1_1DNSAttack.html#ab4f1cacfe4674a0ce9542ba0286fbe44',1,'dns_attack::DNSAttack']]] 7 | ]; 8 | -------------------------------------------------------------------------------- /docs/html/search/all_a.js: -------------------------------------------------------------------------------- 1 | var searchData= 2 | [ 3 | ['nic_5finterface',['nic_interface',['../classdns__attack_1_1DNSAttack.html#a3c814016d291aa3d4635c8964ba79f8a',1,'dns_attack.DNSAttack.nic_interface()'],['../classdns__poisoning_1_1DNSPoisoning.html#ad93385ef31024e556a14abdca1dffed7',1,'dns_poisoning.DNSPoisoning.nic_interface()']]], 4 | ['normal',['NORMAL',['../classdns__attack_1_1DNSAttack_1_1Mode.html#a7183027ce8667672ea4e4a4d2401befa',1,'dns_attack.DNSAttack.Mode.NORMAL()'],['../classdns__poisoning_1_1DNSPoisoning_1_1AttackType.html#a2401b53573200692044168f09c1b29f4',1,'dns_poisoning.DNSPoisoning.AttackType.NORMAL()']]], 5 | ['nsfetcherror',['NSFetchError',['../classdns__attack_1_1DNSAttack_1_1NSFetchError.html',1,'dns_attack::DNSAttack']]] 6 | ]; 7 | -------------------------------------------------------------------------------- /docs/html/search/all_7.js: -------------------------------------------------------------------------------- 1 | var searchData= 2 | [ 3 | ['initialqueryfailed',['InitialQueryFailed',['../classdns__attack_1_1DNSAttack_1_1InitialQueryFailed.html',1,'dns_attack::DNSAttack']]], 4 | ['interrupt_5fhandler',['interrupt_handler',['../classdns__poisoning_1_1DNSPoisoning.html#a9c8aa320d6ae14df500e4e04cf5f0881',1,'dns_poisoning::DNSPoisoning']]], 5 | ['invalidattacktype',['InvalidAttackType',['../classdns__attack_1_1DNSAttack_1_1InvalidAttackType.html',1,'dns_attack::DNSAttack']]], 6 | ['invalidipaddress',['InvalidIPAddress',['../classdns__attack_1_1DNSAttack_1_1InvalidIPAddress.html',1,'dns_attack::DNSAttack']]], 7 | ['invalidmac',['InvalidMAC',['../classdns__poisoning_1_1DNSPoisoning_1_1InvalidMAC.html',1,'dns_poisoning::DNSPoisoning']]] 8 | ]; 9 | -------------------------------------------------------------------------------- /docs/html/search/variables_0.js: -------------------------------------------------------------------------------- 1 | var searchData= 2 | [ 3 | ['attack_5ftype',['attack_type',['../classdns__attack_1_1DNSAttack.html#ac9f3212f683799488b0cce727c24b3a6',1,'dns_attack.DNSAttack.attack_type()'],['../classdns__poisoning_1_1DNSPoisoning.html#a0454f0574473289744101e6b459a1e49',1,'dns_poisoning.DNSPoisoning.attack_type()']]], 4 | ['attacker_5fip',['attacker_ip',['../classdns__attack_1_1DNSAttack.html#ae92bc03a2f7817ab82645b382c3227f5',1,'dns_attack.DNSAttack.attacker_ip()'],['../classdns__poisoning_1_1DNSPoisoning.html#a1930111c8e62f71561f7fc808f17f306',1,'dns_poisoning.DNSPoisoning.attacker_ip()']]], 5 | ['auth_5fnameserver',['auth_nameserver',['../classdns__poisoning_1_1DNSPoisoning.html#a2b7e61ab81185add0d7a97baab36924f',1,'dns_poisoning::DNSPoisoning']]] 6 | ]; 7 | -------------------------------------------------------------------------------- /docs/html/search/variables_8.js: -------------------------------------------------------------------------------- 1 | var searchData= 2 | [ 3 | ['sigint_5fhandler',['sigint_handler',['../classdns__attack_1_1DNSAttack.html#a47028c7038688c3eae948560e5745e63',1,'dns_attack::DNSAttack']]], 4 | ['source_5fport',['source_port',['../classdns__poisoning_1_1DNSPoisoning.html#a0c6e8babebafaa11ea3036a4ae5e89ed',1,'dns_poisoning::DNSPoisoning']]], 5 | ['spoofed_5fdomain',['spoofed_domain',['../classdns__poisoning_1_1DNSPoisoning.html#a837298577cd23e34cf06ca469ab2ae77',1,'dns_poisoning::DNSPoisoning']]], 6 | ['sport',['sport',['../classdns__poisoning_1_1DNSPoisoning.html#a5cee7b7d0614a3baade77dcf4d5db1d7',1,'dns_poisoning::DNSPoisoning']]], 7 | ['stop_5fflag',['stop_flag',['../classdns__attack_1_1DNSAttack.html#a92fa61338e6c5e785d38adb6055e0cad',1,'dns_attack::DNSAttack']]] 8 | ]; 9 | -------------------------------------------------------------------------------- /docs/html/search/all_1.js: -------------------------------------------------------------------------------- 1 | var searchData= 2 | [ 3 | ['attack_5ftype',['attack_type',['../classdns__attack_1_1DNSAttack.html#ac9f3212f683799488b0cce727c24b3a6',1,'dns_attack.DNSAttack.attack_type()'],['../classdns__poisoning_1_1DNSPoisoning.html#a0454f0574473289744101e6b459a1e49',1,'dns_poisoning.DNSPoisoning.attack_type()']]], 4 | ['attacker_5fip',['attacker_ip',['../classdns__attack_1_1DNSAttack.html#ae92bc03a2f7817ab82645b382c3227f5',1,'dns_attack.DNSAttack.attacker_ip()'],['../classdns__poisoning_1_1DNSPoisoning.html#a1930111c8e62f71561f7fc808f17f306',1,'dns_poisoning.DNSPoisoning.attacker_ip()']]], 5 | ['attacktype',['AttackType',['../classdns__poisoning_1_1DNSPoisoning_1_1AttackType.html',1,'dns_poisoning::DNSPoisoning']]], 6 | ['auth_5fnameserver',['auth_nameserver',['../classdns__poisoning_1_1DNSPoisoning.html#a2b7e61ab81185add0d7a97baab36924f',1,'dns_poisoning::DNSPoisoning']]] 7 | ]; 8 | -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1DNSAttack_1_1CriticalError__inherit__graph.map: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | -------------------------------------------------------------------------------- /docs/latex/classdns__attack_1_1InitialQueryFailed.tex: -------------------------------------------------------------------------------- 1 | \hypertarget{classdns__attack_1_1InitialQueryFailed}{}\section{dns\+\_\+attack.\+Initial\+Query\+Failed Class Reference} 2 | \label{classdns__attack_1_1InitialQueryFailed}\index{dns\+\_\+attack.\+Initial\+Query\+Failed@{dns\+\_\+attack.\+Initial\+Query\+Failed}} 3 | 4 | 5 | Inheritance diagram for dns\+\_\+attack.\+Initial\+Query\+Failed\+: 6 | \nopagebreak 7 | \begin{figure}[H] 8 | \begin{center} 9 | \leavevmode 10 | \includegraphics[width=223pt]{classdns__attack_1_1InitialQueryFailed__inherit__graph} 11 | \end{center} 12 | \end{figure} 13 | 14 | 15 | Collaboration diagram for dns\+\_\+attack.\+Initial\+Query\+Failed\+: 16 | \nopagebreak 17 | \begin{figure}[H] 18 | \begin{center} 19 | \leavevmode 20 | \includegraphics[width=223pt]{classdns__attack_1_1InitialQueryFailed__coll__graph} 21 | \end{center} 22 | \end{figure} 23 | 24 | 25 | The documentation for this class was generated from the following file\+:\begin{DoxyCompactItemize} 26 | \item 27 | dns\+\_\+attack.\+py\end{DoxyCompactItemize} 28 | -------------------------------------------------------------------------------- /docs/html/search/all_0.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 |
11 |
Loading...
12 |
13 | 16 |
Searching...
17 |
No Matches
18 | 24 |
25 | 26 | 27 | -------------------------------------------------------------------------------- /docs/html/search/all_1.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 |
11 |
Loading...
12 |
13 | 16 |
Searching...
17 |
No Matches
18 | 24 |
25 | 26 | 27 | -------------------------------------------------------------------------------- /docs/html/search/all_2.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 |
11 |
Loading...
12 |
13 | 16 |
Searching...
17 |
No Matches
18 | 24 |
25 | 26 | 27 | -------------------------------------------------------------------------------- /docs/html/search/all_3.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 |
11 |
Loading...
12 |
13 | 16 |
Searching...
17 |
No Matches
18 | 24 |
25 | 26 | 27 | -------------------------------------------------------------------------------- /docs/html/search/all_4.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 |
11 |
Loading...
12 |
13 | 16 |
Searching...
17 |
No Matches
18 | 24 |
25 | 26 | 27 | -------------------------------------------------------------------------------- /docs/html/search/all_5.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 |
11 |
Loading...
12 |
13 | 16 |
Searching...
17 |
No Matches
18 | 24 |
25 | 26 | 27 | -------------------------------------------------------------------------------- /docs/html/search/all_6.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 |
11 |
Loading...
12 |
13 | 16 |
Searching...
17 |
No Matches
18 | 24 |
25 | 26 | 27 | -------------------------------------------------------------------------------- /docs/html/search/all_7.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 |
11 |
Loading...
12 |
13 | 16 |
Searching...
17 |
No Matches
18 | 24 |
25 | 26 | 27 | -------------------------------------------------------------------------------- /docs/html/search/all_8.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 |
11 |
Loading...
12 |
13 | 16 |
Searching...
17 |
No Matches
18 | 24 |
25 | 26 | 27 | -------------------------------------------------------------------------------- /docs/html/search/all_9.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 |
11 |
Loading...
12 |
13 | 16 |
Searching...
17 |
No Matches
18 | 24 |
25 | 26 | 27 | -------------------------------------------------------------------------------- /docs/html/search/all_a.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 |
11 |
Loading...
12 |
13 | 16 |
Searching...
17 |
No Matches
18 | 24 |
25 | 26 | 27 | -------------------------------------------------------------------------------- /docs/html/search/all_b.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 |
11 |
Loading...
12 |
13 | 16 |
Searching...
17 |
No Matches
18 | 24 |
25 | 26 | 27 | -------------------------------------------------------------------------------- /docs/html/search/all_c.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 |
11 |
Loading...
12 |
13 | 16 |
Searching...
17 |
No Matches
18 | 24 |
25 | 26 | 27 | -------------------------------------------------------------------------------- /docs/html/search/all_d.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 |
11 |
Loading...
12 |
13 | 16 |
Searching...
17 |
No Matches
18 | 24 |
25 | 26 | 27 | -------------------------------------------------------------------------------- /docs/html/search/all_e.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 |
11 |
Loading...
12 |
13 | 16 |
Searching...
17 |
No Matches
18 | 24 |
25 | 26 | 27 | -------------------------------------------------------------------------------- /docs/html/search/all_f.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 |
11 |
Loading...
12 |
13 | 16 |
Searching...
17 |
No Matches
18 | 24 |
25 | 26 | 27 | -------------------------------------------------------------------------------- /docs/html/search/pages_0.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 |
11 |
Loading...
12 |
13 | 16 |
Searching...
17 |
No Matches
18 | 24 |
25 | 26 | 27 | -------------------------------------------------------------------------------- /docs/html/search/pages_1.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 |
11 |
Loading...
12 |
13 | 16 |
Searching...
17 |
No Matches
18 | 24 |
25 | 26 | 27 | -------------------------------------------------------------------------------- /docs/html/search/classes_0.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 |
11 |
Loading...
12 |
13 | 16 |
Searching...
17 |
No Matches
18 | 24 |
25 | 26 | 27 | -------------------------------------------------------------------------------- /docs/html/search/classes_1.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 |
11 |
Loading...
12 |
13 | 16 |
Searching...
17 |
No Matches
18 | 24 |
25 | 26 | 27 | -------------------------------------------------------------------------------- /docs/html/search/classes_2.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 |
11 |
Loading...
12 |
13 | 16 |
Searching...
17 |
No Matches
18 | 24 |
25 | 26 | 27 | -------------------------------------------------------------------------------- /docs/html/search/classes_3.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 |
11 |
Loading...
12 |
13 | 16 |
Searching...
17 |
No Matches
18 | 24 |
25 | 26 | 27 | -------------------------------------------------------------------------------- /docs/html/search/classes_4.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 |
11 |
Loading...
12 |
13 | 16 |
Searching...
17 |
No Matches
18 | 24 |
25 | 26 | 27 | -------------------------------------------------------------------------------- /docs/html/search/classes_5.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 |
11 |
Loading...
12 |
13 | 16 |
Searching...
17 |
No Matches
18 | 24 |
25 | 26 | 27 | -------------------------------------------------------------------------------- /docs/html/search/classes_6.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 |
11 |
Loading...
12 |
13 | 16 |
Searching...
17 |
No Matches
18 | 24 |
25 | 26 | 27 | -------------------------------------------------------------------------------- /docs/html/search/functions_0.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 |
11 |
Loading...
12 |
13 | 16 |
Searching...
17 |
No Matches
18 | 24 |
25 | 26 | 27 | -------------------------------------------------------------------------------- /docs/html/search/functions_1.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 |
11 |
Loading...
12 |
13 | 16 |
Searching...
17 |
No Matches
18 | 24 |
25 | 26 | 27 | -------------------------------------------------------------------------------- /docs/html/search/functions_2.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 |
11 |
Loading...
12 |
13 | 16 |
Searching...
17 |
No Matches
18 | 24 |
25 | 26 | 27 | -------------------------------------------------------------------------------- /docs/html/search/functions_3.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 |
11 |
Loading...
12 |
13 | 16 |
Searching...
17 |
No Matches
18 | 24 |
25 | 26 | 27 | -------------------------------------------------------------------------------- /docs/html/search/functions_4.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 |
11 |
Loading...
12 |
13 | 16 |
Searching...
17 |
No Matches
18 | 24 |
25 | 26 | 27 | -------------------------------------------------------------------------------- /docs/html/search/functions_5.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 |
11 |
Loading...
12 |
13 | 16 |
Searching...
17 |
No Matches
18 | 24 |
25 | 26 | 27 | -------------------------------------------------------------------------------- /docs/html/search/variables_0.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 |
11 |
Loading...
12 |
13 | 16 |
Searching...
17 |
No Matches
18 | 24 |
25 | 26 | 27 | -------------------------------------------------------------------------------- /docs/html/search/variables_1.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 |
11 |
Loading...
12 |
13 | 16 |
Searching...
17 |
No Matches
18 | 24 |
25 | 26 | 27 | -------------------------------------------------------------------------------- /docs/html/search/variables_2.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 |
11 |
Loading...
12 |
13 | 16 |
Searching...
17 |
No Matches
18 | 24 |
25 | 26 | 27 | -------------------------------------------------------------------------------- /docs/html/search/variables_3.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 |
11 |
Loading...
12 |
13 | 16 |
Searching...
17 |
No Matches
18 | 24 |
25 | 26 | 27 | -------------------------------------------------------------------------------- /docs/html/search/variables_4.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 |
11 |
Loading...
12 |
13 | 16 |
Searching...
17 |
No Matches
18 | 24 |
25 | 26 | 27 | -------------------------------------------------------------------------------- /docs/html/search/variables_5.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 |
11 |
Loading...
12 |
13 | 16 |
Searching...
17 |
No Matches
18 | 24 |
25 | 26 | 27 | -------------------------------------------------------------------------------- /docs/html/search/variables_6.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 |
11 |
Loading...
12 |
13 | 16 |
Searching...
17 |
No Matches
18 | 24 |
25 | 26 | 27 | -------------------------------------------------------------------------------- /docs/html/search/variables_7.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 |
11 |
Loading...
12 |
13 | 16 |
Searching...
17 |
No Matches
18 | 24 |
25 | 26 | 27 | -------------------------------------------------------------------------------- /docs/html/search/variables_8.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 |
11 |
Loading...
12 |
13 | 16 |
Searching...
17 |
No Matches
18 | 24 |
25 | 26 | 27 | -------------------------------------------------------------------------------- /docs/html/search/variables_9.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 |
11 |
Loading...
12 |
13 | 16 |
Searching...
17 |
No Matches
18 | 24 |
25 | 26 | 27 | -------------------------------------------------------------------------------- /docs/html/search/variables_a.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 |
11 |
Loading...
12 |
13 | 16 |
Searching...
17 |
No Matches
18 | 24 |
25 | 26 | 27 | -------------------------------------------------------------------------------- /docs/html/search/namespaces_0.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 |
11 |
Loading...
12 |
13 | 16 |
Searching...
17 |
No Matches
18 | 24 |
25 | 26 | 27 | -------------------------------------------------------------------------------- /docs/html/search/namespaces_1.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 |
11 |
Loading...
12 |
13 | 16 |
Searching...
17 |
No Matches
18 | 24 |
25 | 26 | 27 | -------------------------------------------------------------------------------- /docs/html/menudata.js: -------------------------------------------------------------------------------- 1 | var menudata={children:[ 2 | {text:"Main Page",url:"index.html"}, 3 | {text:"Related Pages",url:"pages.html"}, 4 | {text:"Packages",url:"namespaces.html",children:[ 5 | {text:"Packages",url:"namespaces.html"}]}, 6 | {text:"Classes",url:"annotated.html",children:[ 7 | {text:"Class List",url:"annotated.html"}, 8 | {text:"Class Index",url:"classes.html"}, 9 | {text:"Class Hierarchy",url:"inherits.html"}, 10 | {text:"Class Members",url:"functions.html",children:[ 11 | {text:"All",url:"functions.html",children:[ 12 | {text:"_",url:"functions.html#index__"}, 13 | {text:"a",url:"functions.html#index_a"}, 14 | {text:"b",url:"functions.html#index_b"}, 15 | {text:"c",url:"functions.html#index_c"}, 16 | {text:"d",url:"functions.html#index_d"}, 17 | {text:"f",url:"functions.html#index_f"}, 18 | {text:"g",url:"functions.html#index_g"}, 19 | {text:"i",url:"functions.html#index_i"}, 20 | {text:"l",url:"functions.html#index_l"}, 21 | {text:"n",url:"functions.html#index_n"}, 22 | {text:"o",url:"functions.html#index_o"}, 23 | {text:"r",url:"functions.html#index_r"}, 24 | {text:"s",url:"functions.html#index_s"}, 25 | {text:"t",url:"functions.html#index_t"}, 26 | {text:"v",url:"functions.html#index_v"}]}, 27 | {text:"Functions",url:"functions_func.html"}, 28 | {text:"Variables",url:"functions_vars.html"}]}]}]} 29 | -------------------------------------------------------------------------------- /docs/html/inherit_graph_1.map: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | -------------------------------------------------------------------------------- /docs/html/search/functions_5.js: -------------------------------------------------------------------------------- 1 | var searchData= 2 | [ 3 | ['send_5finitial_5fquery',['send_initial_query',['../classdns__attack_1_1DNSAttack.html#a46b363502a61cddfa71110cd170b669a',1,'dns_attack::DNSAttack']]], 4 | ['set_5fattack_5ftype',['set_attack_type',['../classdns__poisoning_1_1DNSPoisoning.html#a223d460b565f93a6db354e3c1481f3db',1,'dns_poisoning::DNSPoisoning']]], 5 | ['set_5fid',['set_id',['../classdns__poisoning_1_1DNSPoisoning.html#aa8595266022046bb1de987b9e5d4d502',1,'dns_poisoning::DNSPoisoning']]], 6 | ['set_5finterface',['set_interface',['../classdns__poisoning_1_1DNSPoisoning.html#a9212c2ddbca12072d16ea7d71f08d1bd',1,'dns_poisoning::DNSPoisoning']]], 7 | ['set_5frandom_5furl',['set_random_url',['../classdns__poisoning_1_1DNSPoisoning.html#aacb8d4fb73ff4e2158a909ea2aef7c0a',1,'dns_poisoning::DNSPoisoning']]], 8 | ['set_5fvictim_5fmac',['set_victim_mac',['../classdns__poisoning_1_1DNSPoisoning.html#a26b03d6d9bb3955bee02bb786f7fa349',1,'dns_poisoning::DNSPoisoning']]], 9 | ['start',['start',['../classdns__attack_1_1DNSAttack.html#af7c96752b795dae4230a0a8ea481f592',1,'dns_attack::DNSAttack']]], 10 | ['start_5fflooding',['start_flooding',['../classdns__poisoning_1_1DNSPoisoning.html#aceeea27bd99034c90c0b940db260a8cb',1,'dns_poisoning::DNSPoisoning']]], 11 | ['stop_5fattack',['stop_attack',['../classdns__attack_1_1DNSAttack.html#a2b6c23161d3648c22a8400a0472ed697',1,'dns_attack::DNSAttack']]], 12 | ['stop_5fhandler',['stop_handler',['../classdns__poisoning_1_1DNSPoisoning.html#a65f1f3e1f022f64ca35c73b80b6ccbfe',1,'dns_poisoning::DNSPoisoning']]] 13 | ]; 14 | -------------------------------------------------------------------------------- /docs/html/menu.js: -------------------------------------------------------------------------------- 1 | function initMenu(relPath,searchEnabled,serverSide,searchPage,search) { 2 | function makeTree(data,relPath) { 3 | var result=''; 4 | if ('children' in data) { 5 | result+=''; 12 | } 13 | return result; 14 | } 15 | 16 | $('#main-nav').append(makeTree(menudata,relPath)); 17 | $('#main-nav').children(':first').addClass('sm sm-dox').attr('id','main-menu'); 18 | if (searchEnabled) { 19 | if (serverSide) { 20 | $('#main-menu').append('
  • '); 21 | } else { 22 | $('#main-menu').append('
  • '); 23 | } 24 | } 25 | $('#main-menu').smartmenus(); 26 | } 27 | -------------------------------------------------------------------------------- /docs/html/search/all_d.js: -------------------------------------------------------------------------------- 1 | var searchData= 2 | [ 3 | ['send_5finitial_5fquery',['send_initial_query',['../classdns__attack_1_1DNSAttack.html#a46b363502a61cddfa71110cd170b669a',1,'dns_attack::DNSAttack']]], 4 | ['set_5fattack_5ftype',['set_attack_type',['../classdns__poisoning_1_1DNSPoisoning.html#a223d460b565f93a6db354e3c1481f3db',1,'dns_poisoning::DNSPoisoning']]], 5 | ['set_5fid',['set_id',['../classdns__poisoning_1_1DNSPoisoning.html#aa8595266022046bb1de987b9e5d4d502',1,'dns_poisoning::DNSPoisoning']]], 6 | ['set_5finterface',['set_interface',['../classdns__poisoning_1_1DNSPoisoning.html#a9212c2ddbca12072d16ea7d71f08d1bd',1,'dns_poisoning::DNSPoisoning']]], 7 | ['set_5frandom_5furl',['set_random_url',['../classdns__poisoning_1_1DNSPoisoning.html#aacb8d4fb73ff4e2158a909ea2aef7c0a',1,'dns_poisoning::DNSPoisoning']]], 8 | ['set_5fvictim_5fmac',['set_victim_mac',['../classdns__poisoning_1_1DNSPoisoning.html#a26b03d6d9bb3955bee02bb786f7fa349',1,'dns_poisoning::DNSPoisoning']]], 9 | ['sigint_5fhandler',['sigint_handler',['../classdns__attack_1_1DNSAttack.html#a47028c7038688c3eae948560e5745e63',1,'dns_attack::DNSAttack']]], 10 | ['source_5fport',['source_port',['../classdns__poisoning_1_1DNSPoisoning.html#a0c6e8babebafaa11ea3036a4ae5e89ed',1,'dns_poisoning::DNSPoisoning']]], 11 | ['spoofed_5fdomain',['spoofed_domain',['../classdns__poisoning_1_1DNSPoisoning.html#a837298577cd23e34cf06ca469ab2ae77',1,'dns_poisoning::DNSPoisoning']]], 12 | ['sport',['sport',['../classdns__poisoning_1_1DNSPoisoning.html#a5cee7b7d0614a3baade77dcf4d5db1d7',1,'dns_poisoning::DNSPoisoning']]], 13 | ['start',['start',['../classdns__attack_1_1DNSAttack.html#af7c96752b795dae4230a0a8ea481f592',1,'dns_attack::DNSAttack']]], 14 | ['start_5fflooding',['start_flooding',['../classdns__poisoning_1_1DNSPoisoning.html#aceeea27bd99034c90c0b940db260a8cb',1,'dns_poisoning::DNSPoisoning']]], 15 | ['stop_5fattack',['stop_attack',['../classdns__attack_1_1DNSAttack.html#a2b6c23161d3648c22a8400a0472ed697',1,'dns_attack::DNSAttack']]], 16 | ['stop_5fflag',['stop_flag',['../classdns__attack_1_1DNSAttack.html#a92fa61338e6c5e785d38adb6055e0cad',1,'dns_attack::DNSAttack']]], 17 | ['stop_5fhandler',['stop_handler',['../classdns__poisoning_1_1DNSPoisoning.html#a65f1f3e1f022f64ca35c73b80b6ccbfe',1,'dns_poisoning::DNSPoisoning']]], 18 | ['successfulattack',['SuccessfulAttack',['../classdns__attack_1_1DNSAttack_1_1SuccessfulAttack.html',1,'dns_attack::DNSAttack']]] 19 | ]; 20 | -------------------------------------------------------------------------------- /docs/html/Mainpage.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | DNS Poisoning Tool: $title 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 |
    19 |
    20 | 21 | 22 | 23 | 27 | 28 | 29 |
    24 |
    DNS Poisoning Tool 25 |
    26 |
    30 |
    31 | 32 | 33 | 36 | 37 | 38 | 44 | 45 | 46 |
    50 |
    51 | 52 | 53 |
    54 | 57 |
    58 | 59 |
    60 |
    61 |

    aaaaaaaaaaaaaaaaaa

    62 |
    63 | 64 | 69 | 70 | 71 | -------------------------------------------------------------------------------- /docs/html/index.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | DNS Poisoning Tool: Main Page 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 |
    19 |
    20 | 21 | 22 | 23 | 27 | 28 | 29 |
    24 |
    DNS Poisoning Tool 25 |
    26 |
    30 |
    31 | 32 | 33 | 36 | 37 | 38 | 44 | 45 |
    46 | 47 |
    51 |
    52 | 53 | 54 |
    55 | 58 |
    59 | 60 |
    61 |
    62 |
    DNS Poisoning Tool Documentation
    63 |
    64 |
    65 |
    66 | 67 | 72 | 73 | 74 | -------------------------------------------------------------------------------- /docs/html/bug.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | DNS Poisoning Tool: Bug List 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 |
    19 |
    20 | 21 | 22 | 23 | 27 | 28 | 29 |
    24 |
    DNS Poisoning Tool 25 |
    26 |
    30 |
    31 | 32 | 33 | 36 | 37 | 38 | 44 | 45 | 46 |
    50 |
    51 | 52 | 53 |
    54 | 57 |
    58 | 59 |
    60 |
    61 |
    62 |
    Bug List
    63 |
    64 |
    65 |
    66 |
    Member dns_poisoning.DNSPoisoning.check_poisoning (self)
    67 |
    Does not work
    68 |
    69 |
    70 | 71 | 76 | 77 | 78 | -------------------------------------------------------------------------------- /docs/html/pages.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | DNS Poisoning Tool: Related Pages 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 |
    19 |
    20 | 21 | 22 | 23 | 27 | 28 | 29 |
    24 |
    DNS Poisoning Tool 25 |
    26 |
    30 |
    31 | 32 | 33 | 36 | 37 | 38 | 44 | 45 |
    46 | 47 |
    51 |
    52 | 53 | 54 |
    55 | 58 |
    59 | 60 |
    61 |
    62 |
    Related Pages
    63 |
    64 |
    65 |
    Here is a list of all related documentation pages:
    66 | 67 | 68 |
     Todo List
    69 |
    70 |
    71 | 72 | 77 | 78 | 79 | -------------------------------------------------------------------------------- /docs/html/namespaceDNS__Attack.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | DNS Poisoning Tool: DNS_Attack Namespace Reference 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 |
    19 |
    20 | 21 | 22 | 23 | 27 | 28 | 29 |
    24 |
    DNS Poisoning Tool 25 |
    26 |
    30 |
    31 | 32 | 33 | 36 | 37 | 38 | 44 | 45 | 46 |
    50 |
    51 | 52 | 53 |
    54 | 57 |
    58 | 59 |
    60 |
    61 |
    62 |
    DNS_Attack Namespace Reference
    63 |
    64 |
    65 | 66 |

    This package is responsible to execute all the passage required for the attack. 67 | More...

    68 |

    Detailed Description

    69 |

    This package is responsible to execute all the passage required for the attack.

    70 |
    71 | 72 | 77 | 78 | 79 | -------------------------------------------------------------------------------- /docs/html/namespaceMain.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | DNS Poisoning Tool: Main Namespace Reference 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 |
    19 |
    20 | 21 | 22 | 23 | 27 | 28 | 29 |
    24 |
    DNS Poisoning Tool 25 |
    26 |
    30 |
    31 | 32 | 33 | 36 | 37 | 38 | 44 | 45 | 46 |
    50 |
    51 | 52 | 53 |
    54 | 57 |
    58 | 59 |
    60 |
    61 |
    62 |
    Main Namespace Reference
    63 |
    64 |
    65 | 66 |

    This package is responsible to execute all the passages required for the attack related to our ETH homework. 67 | More...

    68 |

    Detailed Description

    69 |

    This package is responsible to execute all the passages required for the attack related to our ETH homework.

    70 |
    71 | 72 | 77 | 78 | 79 | -------------------------------------------------------------------------------- /docs/html/dynsections.js: -------------------------------------------------------------------------------- 1 | function toggleVisibility(linkObj) 2 | { 3 | var base = $(linkObj).attr('id'); 4 | var summary = $('#'+base+'-summary'); 5 | var content = $('#'+base+'-content'); 6 | var trigger = $('#'+base+'-trigger'); 7 | var src=$(trigger).attr('src'); 8 | if (content.is(':visible')===true) { 9 | content.hide(); 10 | summary.show(); 11 | $(linkObj).addClass('closed').removeClass('opened'); 12 | $(trigger).attr('src',src.substring(0,src.length-8)+'closed.png'); 13 | } else { 14 | content.show(); 15 | summary.hide(); 16 | $(linkObj).removeClass('closed').addClass('opened'); 17 | $(trigger).attr('src',src.substring(0,src.length-10)+'open.png'); 18 | } 19 | return false; 20 | } 21 | 22 | function updateStripes() 23 | { 24 | $('table.directory tr'). 25 | removeClass('even').filter(':visible:even').addClass('even'); 26 | } 27 | 28 | function toggleLevel(level) 29 | { 30 | $('table.directory tr').each(function() { 31 | var l = this.id.split('_').length-1; 32 | var i = $('#img'+this.id.substring(3)); 33 | var a = $('#arr'+this.id.substring(3)); 34 | if (l 2 | 3 | 4 | 5 | 6 | 7 | 8 | DNS Poisoning Tool: Todo List 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 |
    19 |
    20 | 21 | 22 | 23 | 27 | 28 | 29 |
    24 |
    DNS Poisoning Tool 25 |
    26 |
    30 |
    31 | 32 | 33 | 36 | 37 | 38 | 44 | 45 | 46 |
    50 |
    51 | 52 | 53 |
    54 | 57 |
    58 | 59 |
    60 |
    61 |
    62 |
    Todo List
    63 |
    64 |
    65 |
    66 |
    Member dns_attack.DNSAttack.__init__ (self, victim_server_ip, attacked_domain, bad_server_data, attacker_ip, bad_domain, ns_server_ip=None, victim_mac=None, nic_interface=None, sigint_handler=None, log_function=lambda msg:None)
    67 |
    Check if port and IP are valid
    68 |
    Class dns_attack.DNSAttack.InvalidIPAddress
    69 |
    To implement
    70 |
    71 |
    72 | 73 | 78 | 79 | 80 | -------------------------------------------------------------------------------- /docs/html/namespaces.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | DNS Poisoning Tool: Packages 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 |
    19 |
    20 | 21 | 22 | 23 | 27 | 28 | 29 |
    24 |
    DNS Poisoning Tool 25 |
    26 |
    30 |
    31 | 32 | 33 | 36 | 37 | 38 | 44 | 45 |
    46 | 47 |
    51 |
    52 | 53 | 54 |
    55 | 58 |
    59 | 60 |
    61 |
    62 |
    Packages
    63 |
    64 |
    65 |
    Here are the packages with brief descriptions (if available):
    66 | 67 | 68 | 69 |
     NDNS_AttackThis package is responsible to execute all the passage required for the attack
     NMainThis package is responsible to execute all the passages required for the attack related to our ETH homework
    70 |
    71 |
    72 | 73 | 78 | 79 | 80 | -------------------------------------------------------------------------------- /docs/html/namespaceDNS__Poisoning.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | DNS Poisoning Tool: DNS_Poisoning Namespace Reference 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 |
    19 |
    20 | 21 | 22 | 23 | 27 | 28 | 29 |
    24 |
    DNS Poisoning Tool 25 |
    26 |
    30 |
    31 | 32 | 33 | 36 | 37 | 38 | 44 | 45 | 46 |
    50 |
    51 | 52 | 53 |
    54 | 57 |
    58 | 59 |
    60 |
    61 |
    62 |
    DNS_Poisoning Namespace Reference
    63 |
    64 |
    65 | 66 |

    This package includes all methos to execute the poisoning attack. 67 | More...

    68 |

    Detailed Description

    69 |

    This package includes all methos to execute the poisoning attack.

    70 |

    DNSPoisoning.faster_flooding sends packet at layer two (for this reason it requires both victim MAC and network interface specified) , making the attack faster and more prone to succed. However this feature can be used only when the victim server is on the same network of the attacker.
    71 | DNSPoisoning.start instead uses the IP layer and therefore can be applied in any situation.
    72 | Two types of attack are implemented:

      73 |
    • Classical Attack
    • 74 |
    • Dan's Attack
    • 75 |
    76 |

    The first one only tries to spoof a single domain (the one setted in the "spoofed_domain") while the other one tries to spoof the NS server.

    77 |
    78 | 79 | 84 | 85 | 86 | -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1DNSAttack_1_1Mode-members.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | DNS Poisoning Tool: Member List 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 |
    19 |
    20 | 21 | 22 | 23 | 27 | 28 | 29 |
    24 |
    DNS Poisoning Tool 25 |
    26 |
    30 |
    31 | 32 | 33 | 36 | 37 | 38 | 44 | 45 | 46 |
    50 |
    51 | 52 | 53 |
    54 | 57 |
    58 | 59 | 63 |
    64 |
    65 |
    66 |
    dns_attack.DNSAttack.Mode Member List
    67 |
    68 |
    69 | 70 |

    This is the complete list of members for dns_attack.DNSAttack.Mode, including all inherited members.

    71 | 72 | 73 | 74 |
    FASTdns_attack.DNSAttack.Modestatic
    NORMALdns_attack.DNSAttack.Modestatic
    75 | 76 | 81 | 82 | 83 | -------------------------------------------------------------------------------- /docs/html/classdns__poisoning_1_1DNSPoisoning_1_1AttackType-members.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | DNS Poisoning Tool: Member List 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 |
    19 |
    20 | 21 | 22 | 23 | 27 | 28 | 29 |
    24 |
    DNS Poisoning Tool 25 |
    26 |
    30 |
    31 | 32 | 33 | 36 | 37 | 38 | 44 | 45 | 46 |
    50 |
    51 | 52 | 53 |
    54 | 57 |
    58 | 59 | 63 |
    64 |
    65 |
    66 |
    dns_poisoning.DNSPoisoning.AttackType Member List
    67 |
    68 |
    69 | 70 |

    This is the complete list of members for dns_poisoning.DNSPoisoning.AttackType, including all inherited members.

    71 | 72 | 73 | 74 |
    DANdns_poisoning.DNSPoisoning.AttackTypestatic
    NORMALdns_poisoning.DNSPoisoning.AttackTypestatic
    75 | 76 | 81 | 82 | 83 | -------------------------------------------------------------------------------- /docs/latex/classdns__poisoning_1_1DNSPoisoning.tex: -------------------------------------------------------------------------------- 1 | \hypertarget{classdns__poisoning_1_1DNSPoisoning}{}\section{dns\+\_\+poisoning.\+D\+N\+S\+Poisoning Class Reference} 2 | \label{classdns__poisoning_1_1DNSPoisoning}\index{dns\+\_\+poisoning.\+D\+N\+S\+Poisoning@{dns\+\_\+poisoning.\+D\+N\+S\+Poisoning}} 3 | \subsection*{Public Member Functions} 4 | \begin{DoxyCompactItemize} 5 | \item 6 | \mbox{\Hypertarget{classdns__poisoning_1_1DNSPoisoning_a2aefb588dff724bbb239fb54e2c6ca19}\label{classdns__poisoning_1_1DNSPoisoning_a2aefb588dff724bbb239fb54e2c6ca19}} 7 | def {\bfseries \+\_\+\+\_\+init\+\_\+\+\_\+} (self, victim\+\_\+server, spoofed\+\_\+domain, attacker\+\_\+ip, authoritative\+\_\+nameserver, initial\+\_\+id, interrupt\+\_\+handler=None, log=lambda msg\+:\+None) 8 | \item 9 | \mbox{\Hypertarget{classdns__poisoning_1_1DNSPoisoning_a7208959663e75447b0221fc7fab129e7}\label{classdns__poisoning_1_1DNSPoisoning_a7208959663e75447b0221fc7fab129e7}} 10 | def {\bfseries send\+\_\+crafted\+\_\+packet} (self, id\+\_\+req) 11 | \item 12 | \mbox{\Hypertarget{classdns__poisoning_1_1DNSPoisoning_a0c8ff9306f38db988648645b93f399d1}\label{classdns__poisoning_1_1DNSPoisoning_a0c8ff9306f38db988648645b93f399d1}} 13 | def {\bfseries send\+\_\+inital\+\_\+query} (self) 14 | \item 15 | \mbox{\Hypertarget{classdns__poisoning_1_1DNSPoisoning_a1154be89dbdf8a2769a2ca1d3635f363}\label{classdns__poisoning_1_1DNSPoisoning_a1154be89dbdf8a2769a2ca1d3635f363}} 16 | def {\bfseries start\+\_\+flooding} (self) 17 | \item 18 | \mbox{\Hypertarget{classdns__poisoning_1_1DNSPoisoning_aa59092cd2bd23620644af9814f782888}\label{classdns__poisoning_1_1DNSPoisoning_aa59092cd2bd23620644af9814f782888}} 19 | def {\bfseries check\+\_\+poisoning} (self) 20 | \item 21 | \mbox{\Hypertarget{classdns__poisoning_1_1DNSPoisoning_a65f1f3e1f022f64ca35c73b80b6ccbfe}\label{classdns__poisoning_1_1DNSPoisoning_a65f1f3e1f022f64ca35c73b80b6ccbfe}} 22 | def {\bfseries stop\+\_\+handler} (self, sig, frame) 23 | \end{DoxyCompactItemize} 24 | \subsection*{Public Attributes} 25 | \begin{DoxyCompactItemize} 26 | \item 27 | \mbox{\Hypertarget{classdns__poisoning_1_1DNSPoisoning_a7ddda8f8750a3f6be247ba0aa2ae62da}\label{classdns__poisoning_1_1DNSPoisoning_a7ddda8f8750a3f6be247ba0aa2ae62da}} 28 | {\bfseries victim\+\_\+server} 29 | \item 30 | \mbox{\Hypertarget{classdns__poisoning_1_1DNSPoisoning_a837298577cd23e34cf06ca469ab2ae77}\label{classdns__poisoning_1_1DNSPoisoning_a837298577cd23e34cf06ca469ab2ae77}} 31 | {\bfseries spoofed\+\_\+domain} 32 | \item 33 | \mbox{\Hypertarget{classdns__poisoning_1_1DNSPoisoning_a1930111c8e62f71561f7fc808f17f306}\label{classdns__poisoning_1_1DNSPoisoning_a1930111c8e62f71561f7fc808f17f306}} 34 | {\bfseries attacker\+\_\+ip} 35 | \item 36 | \mbox{\Hypertarget{classdns__poisoning_1_1DNSPoisoning_a96cc4f6a6168118999763b206b72cf96}\label{classdns__poisoning_1_1DNSPoisoning_a96cc4f6a6168118999763b206b72cf96}} 37 | {\bfseries id} 38 | \item 39 | \mbox{\Hypertarget{classdns__poisoning_1_1DNSPoisoning_a5cee7b7d0614a3baade77dcf4d5db1d7}\label{classdns__poisoning_1_1DNSPoisoning_a5cee7b7d0614a3baade77dcf4d5db1d7}} 40 | {\bfseries sport} 41 | \item 42 | \mbox{\Hypertarget{classdns__poisoning_1_1DNSPoisoning_ab54c7e8e4345d5ac1b054a2bf91aead5}\label{classdns__poisoning_1_1DNSPoisoning_ab54c7e8e4345d5ac1b054a2bf91aead5}} 43 | {\bfseries flood\+\_\+socket} 44 | \item 45 | \mbox{\Hypertarget{classdns__poisoning_1_1DNSPoisoning_a2b7e61ab81185add0d7a97baab36924f}\label{classdns__poisoning_1_1DNSPoisoning_a2b7e61ab81185add0d7a97baab36924f}} 46 | {\bfseries auth\+\_\+nameserver} 47 | \item 48 | \mbox{\Hypertarget{classdns__poisoning_1_1DNSPoisoning_a00a22b2725214b6052827a16b067066e}\label{classdns__poisoning_1_1DNSPoisoning_a00a22b2725214b6052827a16b067066e}} 49 | {\bfseries flood\+\_\+pool} 50 | \item 51 | \mbox{\Hypertarget{classdns__poisoning_1_1DNSPoisoning_a9c8aa320d6ae14df500e4e04cf5f0881}\label{classdns__poisoning_1_1DNSPoisoning_a9c8aa320d6ae14df500e4e04cf5f0881}} 52 | {\bfseries interrupt\+\_\+handler} 53 | \item 54 | \mbox{\Hypertarget{classdns__poisoning_1_1DNSPoisoning_a57e074a324e5682d4a0a0a02856c8e39}\label{classdns__poisoning_1_1DNSPoisoning_a57e074a324e5682d4a0a0a02856c8e39}} 55 | {\bfseries invalid\+\_\+url} 56 | \end{DoxyCompactItemize} 57 | 58 | 59 | The documentation for this class was generated from the following file\+:\begin{DoxyCompactItemize} 60 | \item 61 | dns\+\_\+poisoning.\+py\end{DoxyCompactItemize} 62 | -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1DNSAttack_1_1SuccessfulAttack.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | DNS Poisoning Tool: dns_attack.DNSAttack.SuccessfulAttack Class Reference 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 |
    19 |
    20 | 21 | 22 | 23 | 27 | 28 | 29 |
    24 |
    DNS Poisoning Tool 25 |
    26 |
    30 |
    31 | 32 | 33 | 36 | 37 | 38 | 44 | 45 | 46 |
    50 |
    51 | 52 | 53 |
    54 | 57 |
    58 | 59 | 63 |
    64 |
    65 |
    66 |
    dns_attack.DNSAttack.SuccessfulAttack Class Reference
    67 |
    68 |
    69 | 70 |

    Raised when the attack succeded. 71 | More...

    72 |
    73 | Inheritance diagram for dns_attack.DNSAttack.SuccessfulAttack:
    74 |
    75 |
    Inheritance graph
    76 |
    [legend]
    77 |
    78 | Collaboration diagram for dns_attack.DNSAttack.SuccessfulAttack:
    79 |
    80 |
    Collaboration graph
    81 |
    [legend]
    82 |

    Detailed Description

    83 |

    Raised when the attack succeded.

    84 |

    The documentation for this class was generated from the following file: 87 |
    88 | 89 | 94 | 95 | 96 | -------------------------------------------------------------------------------- /docs/html/classdns__poisoning_1_1DNSPoisoning_1_1InvalidMAC.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | DNS Poisoning Tool: dns_poisoning.DNSPoisoning.InvalidMAC Class Reference 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 |
    19 |
    20 | 21 | 22 | 23 | 27 | 28 | 29 |
    24 |
    DNS Poisoning Tool 25 |
    26 |
    30 |
    31 | 32 | 33 | 36 | 37 | 38 | 44 | 45 | 46 |
    50 |
    51 | 52 | 53 |
    54 | 57 |
    58 | 59 | 63 |
    64 |
    65 |
    66 |
    dns_poisoning.DNSPoisoning.InvalidMAC Class Reference
    67 |
    68 |
    69 | 70 |

    Raised when an invalid MAC address is provided. 71 | More...

    72 |
    73 | Inheritance diagram for dns_poisoning.DNSPoisoning.InvalidMAC:
    74 |
    75 |
    Inheritance graph
    76 |
    [legend]
    77 |
    78 | Collaboration diagram for dns_poisoning.DNSPoisoning.InvalidMAC:
    79 |
    80 |
    Collaboration graph
    81 |
    [legend]
    82 |

    Detailed Description

    83 |

    Raised when an invalid MAC address is provided.

    84 |

    The documentation for this class was generated from the following file: 87 |
    88 | 89 | 94 | 95 | 96 | -------------------------------------------------------------------------------- /docs/latex/refman.tex: -------------------------------------------------------------------------------- 1 | \documentclass[twoside]{book} 2 | 3 | % Packages required by doxygen 4 | \usepackage{fixltx2e} 5 | \usepackage{calc} 6 | \usepackage{doxygen} 7 | \usepackage[export]{adjustbox} % also loads graphicx 8 | \usepackage{graphicx} 9 | \usepackage[utf8]{inputenc} 10 | \usepackage{makeidx} 11 | \usepackage{multicol} 12 | \usepackage{multirow} 13 | \PassOptionsToPackage{warn}{textcomp} 14 | \usepackage{textcomp} 15 | \usepackage[nointegrals]{wasysym} 16 | \usepackage[table]{xcolor} 17 | 18 | % Font selection 19 | \usepackage[T1]{fontenc} 20 | \usepackage[scaled=.90]{helvet} 21 | \usepackage{courier} 22 | \usepackage{amssymb} 23 | \usepackage{sectsty} 24 | \renewcommand{\familydefault}{\sfdefault} 25 | \allsectionsfont{% 26 | \fontseries{bc}\selectfont% 27 | \color{darkgray}% 28 | } 29 | \renewcommand{\DoxyLabelFont}{% 30 | \fontseries{bc}\selectfont% 31 | \color{darkgray}% 32 | } 33 | \newcommand{\+}{\discretionary{\mbox{\scriptsize$\hookleftarrow$}}{}{}} 34 | 35 | % Page & text layout 36 | \usepackage{geometry} 37 | \geometry{% 38 | a4paper,% 39 | top=2.5cm,% 40 | bottom=2.5cm,% 41 | left=2.5cm,% 42 | right=2.5cm% 43 | } 44 | \tolerance=750 45 | \hfuzz=15pt 46 | \hbadness=750 47 | \setlength{\emergencystretch}{15pt} 48 | \setlength{\parindent}{0cm} 49 | \setlength{\parskip}{3ex plus 2ex minus 2ex} 50 | \makeatletter 51 | \renewcommand{\paragraph}{% 52 | \@startsection{paragraph}{4}{0ex}{-1.0ex}{1.0ex}{% 53 | \normalfont\normalsize\bfseries\SS@parafont% 54 | }% 55 | } 56 | \renewcommand{\subparagraph}{% 57 | \@startsection{subparagraph}{5}{0ex}{-1.0ex}{1.0ex}{% 58 | \normalfont\normalsize\bfseries\SS@subparafont% 59 | }% 60 | } 61 | \makeatother 62 | 63 | % Headers & footers 64 | \usepackage{fancyhdr} 65 | \pagestyle{fancyplain} 66 | \fancyhead[LE]{\fancyplain{}{\bfseries\thepage}} 67 | \fancyhead[CE]{\fancyplain{}{}} 68 | \fancyhead[RE]{\fancyplain{}{\bfseries\leftmark}} 69 | \fancyhead[LO]{\fancyplain{}{\bfseries\rightmark}} 70 | \fancyhead[CO]{\fancyplain{}{}} 71 | \fancyhead[RO]{\fancyplain{}{\bfseries\thepage}} 72 | \fancyfoot[LE]{\fancyplain{}{}} 73 | \fancyfoot[CE]{\fancyplain{}{}} 74 | \fancyfoot[RE]{\fancyplain{}{\bfseries\scriptsize Generated by Doxygen }} 75 | \fancyfoot[LO]{\fancyplain{}{\bfseries\scriptsize Generated by Doxygen }} 76 | \fancyfoot[CO]{\fancyplain{}{}} 77 | \fancyfoot[RO]{\fancyplain{}{}} 78 | \renewcommand{\footrulewidth}{0.4pt} 79 | \renewcommand{\chaptermark}[1]{% 80 | \markboth{#1}{}% 81 | } 82 | \renewcommand{\sectionmark}[1]{% 83 | \markright{\thesection\ #1}% 84 | } 85 | 86 | % Indices & bibliography 87 | \usepackage{natbib} 88 | \usepackage[titles]{tocloft} 89 | \setcounter{tocdepth}{3} 90 | \setcounter{secnumdepth}{5} 91 | \makeindex 92 | 93 | % Hyperlinks (required, but should be loaded last) 94 | \usepackage{ifpdf} 95 | \ifpdf 96 | \usepackage[pdftex,pagebackref=true]{hyperref} 97 | \else 98 | \usepackage[ps2pdf,pagebackref=true]{hyperref} 99 | \fi 100 | \hypersetup{% 101 | colorlinks=true,% 102 | linkcolor=blue,% 103 | citecolor=blue,% 104 | unicode% 105 | } 106 | 107 | % Custom commands 108 | \newcommand{\clearemptydoublepage}{% 109 | \newpage{\pagestyle{empty}\cleardoublepage}% 110 | } 111 | 112 | \usepackage{caption} 113 | \captionsetup{labelsep=space,justification=centering,font={bf},singlelinecheck=off,skip=4pt,position=top} 114 | 115 | %===== C O N T E N T S ===== 116 | 117 | \begin{document} 118 | 119 | % Titlepage & ToC 120 | \hypersetup{pageanchor=false, 121 | bookmarksnumbered=true, 122 | pdfencoding=unicode 123 | } 124 | \pagenumbering{alph} 125 | \begin{titlepage} 126 | \vspace*{7cm} 127 | \begin{center}% 128 | {\Large D\+NS Poisoning Tool }\\ 129 | \vspace*{1cm} 130 | {\large Generated by Doxygen 1.8.13}\\ 131 | \end{center} 132 | \end{titlepage} 133 | \clearemptydoublepage 134 | \pagenumbering{roman} 135 | \tableofcontents 136 | \clearemptydoublepage 137 | \pagenumbering{arabic} 138 | \hypersetup{pageanchor=true} 139 | 140 | %--- Begin generated contents --- 141 | \chapter{Namespace Index} 142 | \input{namespaces} 143 | \chapter{Hierarchical Index} 144 | \input{hierarchy} 145 | \chapter{Class Index} 146 | \input{annotated} 147 | \chapter{Namespace Documentation} 148 | \input{namespaceDNS__Attack} 149 | \input{namespaceDNS__Poisoning} 150 | \chapter{Class Documentation} 151 | \input{classdns__poisoning_1_1DNSPoisoning} 152 | \input{classdns__attack_1_1InitialQueryFailed} 153 | %--- End generated contents --- 154 | 155 | % Index 156 | \backmatter 157 | \newpage 158 | \phantomsection 159 | \clearemptydoublepage 160 | \addcontentsline{toc}{chapter}{Index} 161 | \printindex 162 | 163 | \end{document} 164 | -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1InitialQueryFailed.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | DNS Poisoning Tool: dns_attack.InitialQueryFailed Class Reference 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 |
    19 |
    20 | 21 | 22 | 23 | 27 | 28 | 29 |
    24 |
    DNS Poisoning Tool 25 |
    26 |
    30 |
    31 | 32 | 33 | 36 | 37 | 38 | 44 | 45 | 46 |
    50 |
    51 | 52 | 53 |
    54 | 57 |
    58 | 59 | 63 |
    64 |
    65 |
    66 |
    dns_attack.InitialQueryFailed Class Reference
    67 |
    68 |
    69 | 70 |

    InitialQueryFailed Exception raised when the initial query fails. 71 | More...

    72 |
    73 | Inheritance diagram for dns_attack.InitialQueryFailed:
    74 |
    75 |
    Inheritance graph
    76 |
    [legend]
    77 |
    78 | Collaboration diagram for dns_attack.InitialQueryFailed:
    79 |
    80 |
    Collaboration graph
    81 |
    [legend]
    82 |

    Detailed Description

    83 |

    InitialQueryFailed Exception raised when the initial query fails.

    84 |

    Raised when initial query performed to get a TXID fails

    85 |

    The documentation for this class was generated from the following file: 88 |
    89 | 90 | 95 | 96 | 97 | -------------------------------------------------------------------------------- /docs/html/classhomework_1_1DNSAttack_1_1InitialQueryFailed.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | DNS Poisoning Tool: homework.DNSAttack.InitialQueryFailed Class Reference 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 |
    19 |
    20 | 21 | 22 | 23 | 27 | 28 | 29 |
    24 |
    DNS Poisoning Tool 25 |
    26 |
    30 |
    31 | 32 | 33 | 36 | 37 | 38 | 44 | 45 | 46 |
    50 |
    51 | 52 | 53 |
    54 | 57 |
    58 | 59 | 63 |
    64 |
    65 |
    66 |
    homework.DNSAttack.InitialQueryFailed Class Reference
    67 |
    68 |
    69 | 70 |

    InitialQueryFailed Exception raised when the initial query fails. 71 | More...

    72 |
    73 | Inheritance diagram for homework.DNSAttack.InitialQueryFailed:
    74 |
    75 |
    Inheritance graph
    76 |
    [legend]
    77 |
    78 | Collaboration diagram for homework.DNSAttack.InitialQueryFailed:
    79 |
    80 |
    Collaboration graph
    81 |
    [legend]
    82 |

    Detailed Description

    83 |

    InitialQueryFailed Exception raised when the initial query fails.

    84 |

    Raised when initial query performed to get a TXID fails

    85 |

    The documentation for this class was generated from the following file: 88 |
    89 | 90 | 95 | 96 | 97 | -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 | # DNS Poisoning Tool 2 | A tool to perform DNS cache poisoning against vulnerable server. 3 | 4 | ![Image](docs/dnspoisoning_screen_2.png) 5 | 6 | Both attack methodology is widely described here: [Kaminsky Attack](http://unixwiz.net/techtips/iguide-kaminsky-dns-vuln.html) 7 | 8 | A detailed software documentation can be found [here](https://gr3yc4t.github.io/dns-poisoning-tool/html/annotated.html) 9 | 10 | **WARNING**: This code is intended to be used only in the context of a particular assignment. If you want to reuse some of the functionalities refer to the [modules section](#modules). 11 | 12 | **NOTE**: When used to test homework result the **FAST** mode is mandatory since otherwise packets are transmitted too slowly causing the attack to fail. 13 | 14 | ## Requirements 15 | * Scapy (For packet crafting) `pip3 install scapy` 16 | * Blessing (For coloured terminal) `pip3 install blessings` 17 | * DNS Python (For initial DNS query) `pip3 install dnspython` 18 | 19 | Inline requirements installation command pip install: 20 | 21 | ```pip3 install scapy blessings dnspython``` 22 | 23 | Otherwise simply use the provided requirements file 24 | 25 | ```pip3 install -r requirements.txt``` 26 | 27 | ## Usage 28 | The files ```launch.sh``` and ```launch_fast.sh``` can be edited with all the necessary paramters to carry on the attack or, instead, you could use the command line parameter directly. 29 | 30 | ``` 31 | usage: main.py [-h] -t DOMAIN -a ATTACKER_IP -v VICTIM_DNS_IP 32 | [-bs BAD_SERVER_IP] [-bp BAD_SERVER_PORT] -bd BAD_DOMAIN 33 | [-ns NS_SERVER] [-i INTERFACE] [-at {NORMAL,DAN}] 34 | [-m {NORMAL,FAST}] [-vm VICTIM_MAC] [-si SECRET_IP] 35 | [-sp SECRET_PORT] [-n NUM_ATTACK] [-nc] [-vb {1,2,3,4}] 36 | 37 | DNS Poisoning Attack Tool 38 | 39 | optional arguments: 40 | -h, --help show this help message and exit 41 | -t DOMAIN, --target-domain DOMAIN 42 | The target domain to spoof 43 | -a ATTACKER_IP, --attacker-ip ATTACKER_IP 44 | Attacker IP address 45 | -v VICTIM_DNS_IP, --victim-dns-ip VICTIM_DNS_IP 46 | The victim DNS IP address 47 | -bs BAD_SERVER_IP, --bad-server-ip BAD_SERVER_IP 48 | The Bad Guy DNS server IP 49 | -bp BAD_SERVER_PORT, --bad-server-port BAD_SERVER_PORT 50 | The Bad Guy DNS server port 51 | -bd BAD_DOMAIN, --bad-domain BAD_DOMAIN 52 | The domain belonging to the attacker controlled zone 53 | -ns NS_SERVER, --ns-server NS_SERVER 54 | The victim authoritative server 55 | -i INTERFACE, --interface INTERFACE 56 | The Network Card interface to use 57 | -at {NORMAL,DAN}, --attack-type {NORMAL,DAN} 58 | The type of attack to perform 59 | -m {NORMAL,FAST}, --mode {NORMAL,FAST} 60 | Mode to use 61 | -vm VICTIM_MAC, --victim-mac VICTIM_MAC 62 | The victim MAC address 63 | -si SECRET_IP, --secret-ip SECRET_IP 64 | IP to bind for the secret fetcher 65 | -sp SECRET_PORT, --secret-port SECRET_PORT 66 | Port to bind for the secret fetcher 67 | -n NUM_ATTACK, --num-attack NUM_ATTACK 68 | Number of attack to perform 69 | -nc, --no-colors Suppress coloured terminal output 70 | -vb {1,2,3,4}, --verbosity {1,2,3,4} 71 | Verbosity level 72 | ``` 73 | ## Features 74 | The tool support two version of the attack that can be specified with the related parameter 75 | * Classical poisoning ([Shenanigans Version 1](http://unixwiz.net/techtips/iguide-kaminsky-dns-vuln.html#shenanigansv1)) 76 | * Dan's Shenanigans ([Dan's Version](http://unixwiz.net/techtips/iguide-kaminsky-dns-vuln.html#shenanigansv2)) 77 | 78 | In addition two modes are available for flooding 79 | * **Normal Flooding** - which uses IP layer 80 | * **Faster Flooding** - which uses Ethernet layer 81 | 82 | When "*faster flooding*" is used, both victim MAC Address and a network interface must be supplied. 83 | 84 | The secret is printed both on the terminal output and in ```log_secret.txt``` file. 85 | 86 | ### Modules 87 | The code is developed in a modular way in order to be implemented in other tools. An extensive class documentation can be found [here](https://gr3yc4t.github.io/dns-poisoning-tool/html/annotated.html). 88 | For example the following code starts a flood of DNS crafted response against the server at "8.8.8.8" in order to spoof the google domain and redirect users to the attacker IP (66.66.66.66): 89 | ```python 90 | import DNSPoisoning 91 | 92 | poisoning = DNSPoisoning('8.8.8.8', 'www.google.com', '66.66.66.66') 93 | poisoning.start_flooding() 94 | ``` 95 | 96 | ### Bugs 97 | When runninng in faster mode, a single CTRL+C signal is not sufficient to stop the execution due to some thread/signal handler bug. Therefore to completely stop the tool is required to hold CTRL+C for few seconds until the terminate the application. 98 | -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1DNSAttack_1_1NSFetchError.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | DNS Poisoning Tool: dns_attack.DNSAttack.NSFetchError Class Reference 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 |
    19 |
    20 | 21 | 22 | 23 | 27 | 28 | 29 |
    24 |
    DNS Poisoning Tool 25 |
    26 |
    30 |
    31 | 32 | 33 | 36 | 37 | 38 | 44 | 45 | 46 |
    50 |
    51 | 52 | 53 |
    54 | 57 |
    58 | 59 | 63 |
    64 |
    65 |
    66 |
    dns_attack.DNSAttack.NSFetchError Class Reference
    67 |
    68 |
    69 | 70 |

    Exception raised when NS server IP cannot be fetched. 71 | More...

    72 |
    73 | Inheritance diagram for dns_attack.DNSAttack.NSFetchError:
    74 |
    75 |
    Inheritance graph
    76 | 77 | 78 | 79 |
    [legend]
    80 |
    81 | Collaboration diagram for dns_attack.DNSAttack.NSFetchError:
    82 |
    83 |
    Collaboration graph
    84 | 85 | 86 | 87 |
    [legend]
    88 |

    Detailed Description

    89 |

    Exception raised when NS server IP cannot be fetched.

    90 |

    Raised when NS server IP cannot be fetched

    91 |

    The documentation for this class was generated from the following file: 94 |
    95 | 96 | 101 | 102 | 103 | -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1DNSAttack_1_1InitialQueryFailed.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | DNS Poisoning Tool: dns_attack.DNSAttack.InitialQueryFailed Class Reference 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 |
    19 |
    20 | 21 | 22 | 23 | 27 | 28 | 29 |
    24 |
    DNS Poisoning Tool 25 |
    26 |
    30 |
    31 | 32 | 33 | 36 | 37 | 38 | 44 | 45 | 46 |
    50 |
    51 | 52 | 53 |
    54 | 57 |
    58 | 59 | 63 |
    64 |
    65 |
    66 |
    dns_attack.DNSAttack.InitialQueryFailed Class Reference
    67 |
    68 |
    69 | 70 |

    Exception raised when the initial query fails. 71 | More...

    72 |
    73 | Inheritance diagram for dns_attack.DNSAttack.InitialQueryFailed:
    74 |
    75 |
    Inheritance graph
    76 | 77 | 78 | 79 |
    [legend]
    80 |
    81 | Collaboration diagram for dns_attack.DNSAttack.InitialQueryFailed:
    82 |
    83 |
    Collaboration graph
    84 | 85 | 86 | 87 |
    [legend]
    88 |

    Detailed Description

    89 |

    Exception raised when the initial query fails.

    90 |

    Raised when initial query performed to get a TXID fails

    91 |

    The documentation for this class was generated from the following file: 94 |
    95 | 96 | 101 | 102 | 103 | -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1DNSAttack_1_1InvalidAttackType.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | DNS Poisoning Tool: dns_attack.DNSAttack.InvalidAttackType Class Reference 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 |
    19 |
    20 | 21 | 22 | 23 | 27 | 28 | 29 |
    24 |
    DNS Poisoning Tool 25 |
    26 |
    30 |
    31 | 32 | 33 | 36 | 37 | 38 | 44 | 45 | 46 |
    50 |
    51 | 52 | 53 |
    54 | 57 |
    58 | 59 | 63 |
    64 |
    65 |
    66 |
    dns_attack.DNSAttack.InvalidAttackType Class Reference
    67 |
    68 |
    69 | 70 |

    Exception raised when the passed attack type is not valid. 71 | More...

    72 |
    73 | Inheritance diagram for dns_attack.DNSAttack.InvalidAttackType:
    74 |
    75 |
    Inheritance graph
    76 | 77 | 78 | 79 |
    [legend]
    80 |
    81 | Collaboration diagram for dns_attack.DNSAttack.InvalidAttackType:
    82 |
    83 |
    Collaboration graph
    84 | 85 | 86 | 87 |
    [legend]
    88 |

    Detailed Description

    89 |

    Exception raised when the passed attack type is not valid.

    90 |

    Raised when the passed attack type is not valid

    91 |

    The documentation for this class was generated from the following file: 94 |
    95 | 96 | 101 | 102 | 103 | -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1DNSAttack_1_1InvalidIPAddress.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | DNS Poisoning Tool: dns_attack.DNSAttack.InvalidIPAddress Class Reference 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 |
    19 |
    20 | 21 | 22 | 23 | 27 | 28 | 29 |
    24 |
    DNS Poisoning Tool 25 |
    26 |
    30 |
    31 | 32 | 33 | 36 | 37 | 38 | 44 | 45 | 46 |
    50 |
    51 | 52 | 53 |
    54 | 57 |
    58 | 59 | 63 |
    64 |
    65 |
    66 |
    dns_attack.DNSAttack.InvalidIPAddress Class Reference
    67 |
    68 |
    69 | 70 |

    Exception raised when invalid IP address is passed. 71 | More...

    72 |
    73 | Inheritance diagram for dns_attack.DNSAttack.InvalidIPAddress:
    74 |
    75 |
    Inheritance graph
    76 | 77 | 78 | 79 |
    [legend]
    80 |
    81 | Collaboration diagram for dns_attack.DNSAttack.InvalidIPAddress:
    82 |
    83 |
    Collaboration graph
    84 | 85 | 86 | 87 |
    [legend]
    88 |

    Detailed Description

    89 |

    Exception raised when invalid IP address is passed.

    90 |

    Raised when the passed IP address is invalid

    Todo:
    To implement
    91 |

    The documentation for this class was generated from the following file: 94 |
    95 | 96 | 101 | 102 | 103 | -------------------------------------------------------------------------------- /docs/html/classdns__attack_1_1DNSAttack_1_1CriticalError.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | DNS Poisoning Tool: dns_attack.DNSAttack.CriticalError Class Reference 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 |
    19 |
    20 | 21 | 22 | 23 | 27 | 28 | 29 |
    24 |
    DNS Poisoning Tool 25 |
    26 |
    30 |
    31 | 32 | 33 | 36 | 37 | 38 | 44 | 45 | 46 |
    50 |
    51 | 52 | 53 |
    54 | 57 |
    58 | 59 | 63 |
    64 |
    65 |
    66 |
    dns_attack.DNSAttack.CriticalError Class Reference
    67 |
    68 |
    69 | 70 |

    Raised when a critical error occurred. 71 | More...

    72 |
    73 | Inheritance diagram for dns_attack.DNSAttack.CriticalError:
    74 |
    75 |
    Inheritance graph
    76 | 77 | 78 | 79 | 80 | 81 | 82 |
    [legend]
    83 |
    84 | Collaboration diagram for dns_attack.DNSAttack.CriticalError:
    85 |
    86 |
    Collaboration graph
    87 |
    [legend]
    88 |

    Detailed Description

    89 |

    Raised when a critical error occurred.

    90 |

    The documentation for this class was generated from the following file: 93 |
    94 | 95 | 100 | 101 | 102 | --------------------------------------------------------------------------------