Skip to content

it analyzes TCP and UDP packets that have been captured by a wireshark session during a DNS spoofing attack. This allows us to understand which hostnames our target is trying to connect to and which ports. This is the first step to then be able to sniff the traffic between our target and its destination.

License

Notifications You must be signed in to change notification settings

dokDork/DNSWatchdog

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 
 
 
 
 
 
 

Repository files navigation

DNSWatchdog

License

Description

DNSWatchdog analyzes TCP and UDP packets that have been captured by a wireshark session during a DNS spoofing attack. This allows us to understand which hostnames our target is trying to connect to and which are the target ports. This is the first step to then be able to sniff the traffic between our target and its destination.

Example Usage

python analyze-dns-pcap.py my.pcap 192.168.1.133

and this is a possible result:

Command-line parameters

python analyze-dns-pcap.py <pcap file> <target IP>
Parameter Description Example
pcap file pcap file from wireshark during a DNS spoof session on Target IP my.pcap, mypcapng, ...
target IP IP you are trying to analyze to understand which hostname and port it is connecting to http://www.example.com

How to install it on Kali Linux (or Debian distribution)

It's very simple

cd /opt
pip install pyshark
git clone https://github.com/dokDork/DNSWatchdog.git

About

it analyzes TCP and UDP packets that have been captured by a wireshark session during a DNS spoofing attack. This allows us to understand which hostnames our target is trying to connect to and which ports. This is the first step to then be able to sniff the traffic between our target and its destination.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages