dnsteal – DNS Exfiltration Tool

0

[ad_1]

# cd dnsteal/

# ./dnsteal.py -h

      ___  _  _ ___ _            _

     |   | | / __| |_ ___ __ _| |

     | |) | .` __   _/ _) _` | |

     |___/|_|_|___/_______,_|_|v2.0

 

https://github.com/m57/dnsteal.git —

 

Stealthy file extraction via DNS requests

 

Usage: python ./dnsteal.py [listen_address] [options]

 

Options:

        z      Unzip incoming files.

        v      Verbose output.

        h      This help menu

 

Advanced:

        b      Bytes to send per subdomain                 (default = 57, max=63)

        s      Number of data subdomains per request       (default =  4, ie. $data.$data.$data.$data.$filename)

        f      Length reserved for filename per request    (default = 17)

 

$ python ./dnsteal.py z 127.0.0.1

 

Do not change the parameters unless you understand!

 

The query length cannot exceed 253 bytes. This is including the filename.

The subdomains lengths cannot exceed 63 bytes.

 

Advanced:

        ./dnsteal.py 127.0.0.1 z s 4 b 57 f 17      4 subdomains, 57 bytes => (57 * 4 = 232 bytes) + (4 * ‘.’ = 236). Filename => 17 byte(s)

        ./dnsteal.py 127.0.0.1 z s 4 b 55 f 29      4 subdomains, 55 bytes => (55 * 4 = 220 bytes) + (4 * ‘.’ = 224). Filename => 29 byte(s)

        ./dnsteal.py 127.0.0.1 z s 4 b 63 f  1      4 subdomains, 63 bytes => (62 * 4 = 248 bytes) + (4 * ‘.’ = 252). Filename =>  1 byte(s)

 

 

#



[ad_2]

Source link

Leave a comment