DNSWatchdog analyzes TCP and UDP packets that have been captured by a wireshark session during a DNS spoofing attack. This allows us to understand which hostnames our target is trying to connect to and which are the target ports. This is the first step to then be able to sniff the traffic between our target and its destination.
python analyze-dns-pcap.py my.pcap 192.168.1.133
python analyze-dns-pcap.py <pcap file> <target IP>
Parameter | Description | Example |
---|---|---|
pcap file |
pcap file from wireshark during a DNS spoof session on Target IP | my.pcap , mypcapng , ... |
target IP |
IP you are trying to analyze to understand which hostname and port it is connecting to | http://www.example.com |
It's very simple
cd /opt
pip install pyshark
git clone https://github.com/dokDork/DNSWatchdog.git