Metasploit mailing list archives

DNS cache poisoning difficulty


From: flyingdervish at yahoo.com (Sat Jagat Singh)
Date: Tue, 29 Jul 2008 11:40:09 -0700 (PDT)

In testing the spoof/dns/bailiwicked_host (and also bailiwicked_domain) modules on an internal penetration test I have 
encountered a challenge with firewall filtering of egress to external DNS servers.  Let me be clear, I am on the LAN.  
DNS traffic is not permitted out to the internet except from the organization's own internal DNS servers that perform 
recursive queries for internal users.

With the following settings:

HOSTNAME  attacker.yahoo.com
NEWADDR   192.168.1.100 (my address)
RECONS    192.168.1.50
RHOST     192.168.1.51

Metasploit gets to a point where it attempts to query yahoo's nameserver for authoritativeness and just hangs since the 
traffic gets dropped at the firewall.

Any suggestions?


      



Current thread: