This repository contains the DNS-Kaminsky-Attack code.
The goal of this lab is to show how to exploit the DNS vulnerability found by Dan Kaminsky in 2008. This vulnerability allowed attackers poison the DNS cache and redirect users to malicious servers.
[BankOfAllan.co.uk] <----------> [dns VM| <----------> [Attacker (badguy.ru)]
To manage this laboratory and perform the attack some configurations must be followed on the DNS VM.
The VM can be downloaded here.
Once logged in as root:thisisdns, it is first necessary to configure the .json file as follows and the default gateway in order to receive the FLAG once the poisoning is successful.
root add default gw <attacker-IP>
localIP: <dns-IP>;
localDNSport: 53;
badguyIP: <badguy-IP>;
badguyDNSport: 55553;
secret: <thisIsTheSecret>;
python3 attack.py