mirror of
https://github.com/bettercap/bettercap
synced 2025-08-14 10:46:57 -07:00
fix: do not add unhandled dns types to dns spoofing packets (closes #843)
This commit is contained in:
parent
d63122bab3
commit
4f5f89b6e1
1 changed files with 9 additions and 2 deletions
|
@ -192,6 +192,13 @@ func DnsReply(s *session.Session, TTL uint32, pkt gopacket.Packet, peth *layers.
|
|||
|
||||
answers := make([]layers.DNSResourceRecord, 0)
|
||||
for _, q := range req.Questions {
|
||||
// do not include types we can't handle and that are not needed
|
||||
// for successful spoofing anyway
|
||||
// ref: https://github.com/bettercap/bettercap/issues/843
|
||||
if q.Type.String() == "Unknown" {
|
||||
continue
|
||||
}
|
||||
|
||||
answers = append(answers,
|
||||
layers.DNSResourceRecord{
|
||||
Name: []byte(q.Name),
|
||||
|
@ -231,7 +238,7 @@ func DnsReply(s *session.Session, TTL uint32, pkt gopacket.Packet, peth *layers.
|
|||
|
||||
err, raw = packets.Serialize(ð, &ip6, &udp, &dns)
|
||||
if err != nil {
|
||||
log.Error("error serializing packet: %s.", err)
|
||||
log.Error("error serializing ipv6 packet: %s.", err)
|
||||
return "", ""
|
||||
}
|
||||
} else {
|
||||
|
@ -252,7 +259,7 @@ func DnsReply(s *session.Session, TTL uint32, pkt gopacket.Packet, peth *layers.
|
|||
|
||||
err, raw = packets.Serialize(ð, &ip4, &udp, &dns)
|
||||
if err != nil {
|
||||
log.Error("error serializing packet: %s.", err)
|
||||
log.Error("error serializing ipv4 packet: %s.", err)
|
||||
return "", ""
|
||||
}
|
||||
}
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue