Foreign Python hacker technology, decoy play really good, Dnspwn attack combat tutorial!

Empty hands recall years

  • A programming language
  • python
  • javascript
  • function
  • The module
  • Image
  • hackers
  • DNS
  • html
  • Dnspwn attack

I remember a big guy said that 80% of hacking tools are implemented in Python. The hack first created the target HTTP using the “airpwn” tool and then attacked DNS. The idea behind this attack is simple: Suppose there are two people on an open WLAN: Bob and Eve.

The principle of

I remember one big guy said that 80% of all hacking tools are implemented in Python.



The hack first created the target HTTP using the “airpwn” tool and then attacked DNS. The idea behind this attack is simple:

Suppose there are two people on an open WLAN: Bob and Eve. E wants B to access the malicious web page she created so that she can install the malware on Bob’s computer through a hidden download, or possibly show a deceptive site to try to steal Bob’s authentication information.Process:

Now that you know how this attack works, let’s use Python to automate it.

Set up the Alfa AWUS06H wireless card

root@bt:~# airmon-ng start wlan0

Now that we have monitor mode up and running on the MON0 interface, let’s start writing Python code!

Write attack code

We will implement this hack using the Scapy crawler module. We’ll start by listening for any UDP packets with destination port 53, and then send that packet to us. We’ll write the function send_response later:

Now create a function that can parse the relevant information in the request and inject the response. Parse the package and create the response layer by layer as follows:

With all the minor details omitted, the SCAPy framework makes this fairly easy, with the following code:

Set all flags, then create add on DNS reply:

Finally, we inject this spoofing response:

sendp(response)

demo

HTML response from host 192.168.2.138:

You can add any HTML you want, Javascript, etc.

Screenshot of my phone under attack:

Use the cloud habitat community APP, comfortable ~

For details, please click
Comments (0)

To:


Related articles

  • Set a death trap for hackers
  • Python Black Hat Programming Outline (under change)
  • Introduction to Python Hardware Programming in Action
  • From your fun-loving hero type, I can tell which tech areas you care about!
  • LAN security practical tutorial
  • These safety books are worth reading
  • “Android security Technology Revealed and prevention” – Chapter 2 2.1 save money from…
  • “Android Security Technology Revealed and Prevention” — Chapter 2, 2.1…
  • For the first time, word macro malware, which can steal sensitive user data, appeared on the Mac
  • Making Coding Developer Boo…

The net friend comment on