This commit is contained in:
evilsocket 2018-01-13 13:46:49 +01:00
parent 90c1550a19
commit ce3de2e0ad
2 changed files with 8 additions and 8 deletions

View file

@ -93,20 +93,21 @@ func (s *DNSSpoofer) Configure() error {
}
func (s *DNSSpoofer) dnsReply(pkt gopacket.Packet, peth *layers.Ethernet, pudp *layers.UDP, domain string, req *layers.DNS, target net.HardwareAddr) {
var err error
redir := fmt.Sprintf("(->%s)", s.Address)
who := target.String()
if t, found := s.Session.Targets.Targets[target.String()]; found == true {
log.Info("[%s] Sending spoofed DNS reply for %s %s to %s.", core.Green("dns"), core.Red(domain), core.Dim(redir), core.Bold(t.String()))
} else {
log.Info("[%s] Sending spoofed DNS reply for %s %s to %s.", core.Green("dns"), core.Red(domain), core.Dim(redir), core.Bold(target.String()))
who = t.String()
}
log.Info("[%s] Sending spoofed DNS reply for %s %s to %s.", core.Green("dns"), core.Red(domain), core.Dim(redir), core.Bold(who))
var err error
var src, dst net.IP
nlayer := pkt.NetworkLayer()
if nlayer == nil {
log.Error("Missing network layer skipping packet.")
log.Debug("Missing network layer skipping packet.")
return
}
@ -176,7 +177,6 @@ func (s *DNSSpoofer) dnsReply(pkt gopacket.Packet, peth *layers.Ethernet, pudp *
return
}
} else {
ip4 := layers.IPv4{
Protocol: layers.IPProtocolUDP,
Version: 4,

View file

@ -23,7 +23,7 @@ func NewQueue(iface string) (*Queue, error) {
active: true,
}
q.handle, err = pcap.OpenLive(iface, 65536, true, pcap.BlockForever)
q.handle, err = pcap.OpenLive(iface, 1024, true, pcap.BlockForever)
if err != nil {
return nil, err
}