JudasDNS - Nameserver DNS poisoning attacks.

JudasDNS – Nameserver DNS poisoning attacks.

The author does not hold any responsibility about the bad use of this script, remember that attacking targets without prior concent its ilegal and punish by law, this script was build to show how resource files can automate tasks.

JudasDNS is A DNS proxy server built to be deployed in place of a taken over nameserver to perform targeted exploitation. Judas works by proxying all DNS queries to the legitimate nameservers for a domain. The magic comes with Judas’s rule configurations which allow you to change DNS responses depending on source IP or DNS query type. This allows an attacker to configure a malicious nameserver to do things like selectively re-route inbound email coming from specified source IP ranges (via modified MX records), set extremely long TTLs to keep poisoned records cached, and more.


The above configuration value purposes are the following:
+ version: The configuration file format version (for now is always 1.0.0).
+ port: The port Judas should run on.
+ dns_query_timeout: How long to wait in milliseconds before giving up on a reply from the upstream target nameserver. target_nameservers: The legit nameservers for your target domain, all DNS queries will be sent here from Judas on behalf of all requesting clients.
+ rules: A list of rules with modifications to the DNS response to apply if matched.
+-+ name: Name of a given rule.
+-+ query_type_matches: List of query types to match on such as CNAME, A, etc. A wildcard (*) can also be specified to match any query type.
+-+ ip_range_matches: List of IP ranges to match on. For selectively spoofing responses to a specific range of IPs.
+-+ modifications: See the “Modifications” section of this README.



Source: https://github.com/mandatoryprogrammer