dnsf_ckr is an application used for messing up with domain names. Until now it works on FreeBSD and Linux.
The idea here is sniffing victim’s dns requests and fake the response as soon as possible than real dns server. In this way we can redirect the target machine to anywhere You want.
This application is only for educational purposes. Developer wrote it to show how the DNS protocol can be unsecure in some cases and I think you should use it with responsibility.
How to build it?
In order to build dnsf_ckr you need to use Hefesto(https://github.com/rafael-santiago/hefesto), Is a multiplatform build system which currently runs on Linux, FreeBSD and Windows.
* The victim's ip address
* The victim's real DNS server IP
* What domain names you wish to spoof
# dnsf_ckr attack config sample
# at first, you have to declare your victim alias
# sheep requests name resolutions in 188.8.131.52 (from now on called "cheap-server")
# and so, the domain that your victim accesses and which you want to spoof, in form <domain>:<spoofed-ip>
namelist boring-sites =
# finally, you inform your intentions to dnsf_ckr
with sheep mess up boring-sites
# but yet we need to describe how valid transactions (in normal conditions, e.g. not spoofed) should be occur.
sheep sends requests to cheap-server
What about the dnsf_ckr-core section in .conf file?