A modified version of cujanovic's dns.py for DNS Rebinding attacks. https://github.com/cujanovic/SSRF-Testing/blob/master/dns.py
sudo python3 dns-rebinder.py Whitelisted_IP Rebind_IP Server_IP Port Domain- Whitelisted_IP: IP that the target application likes
- Rebind_IP: IP you want to switch to for the rebind attack
- Server_IP: Server you're running the script on
- Port: usually 53
- Domain: Domain you're using to rebind attack.
sudo python3 dns-rebinder.py 8.8.8.8 127.0.0.1 x.x.x.x 53 attacker.comtest it out :)
dig anything.attacker.comIt will resolve to the whitelisted IP first, then the rebind IP on the 2nd(ish) resolve.
