Showing posts with label dns. Show all posts
Showing posts with label dns. Show all posts
Saturday, September 16, 2017
Ubuntu 12 04 new DNS and VPN issues
Ubuntu 12 04 new DNS and VPN issues
In Ubuntu 12.04 theres 2 major changes with regards to DNS resolving:
1. resolvconf is now used by default
2. a local resolver is now hardcoded into network manager and is used by default
This means that youll see nameserver 127.0.0.1 in your /etc/resolv.conf at all
times, while the real DNS config is managed by dnsmasq started by NetworkManager.
You can see the current DNS config in /run/nm-dns-dnsmasq.conf
There are numerous issues that this approach introduces. More info on the change and possible issues/solutions are here - http://www.stgraber.org/2012/02/24/dns-in-ubuntu-12-04/
My issue was that one of the VPN providers wasnt properly sending the search domain, so I couldnt access the servers by names on this network.
The easies solution is to add the DNS and search domains manually

1. resolvconf is now used by default
2. a local resolver is now hardcoded into network manager and is used by default
This means that youll see nameserver 127.0.0.1 in your /etc/resolv.conf at all
times, while the real DNS config is managed by dnsmasq started by NetworkManager.
You can see the current DNS config in /run/nm-dns-dnsmasq.conf
There are numerous issues that this approach introduces. More info on the change and possible issues/solutions are here - http://www.stgraber.org/2012/02/24/dns-in-ubuntu-12-04/
My issue was that one of the VPN providers wasnt properly sending the search domain, so I couldnt access the servers by names on this network.
The easies solution is to add the DNS and search domains manually

download file now
Saturday, August 26, 2017
Tutorial memasang DNS Nawala Nawala Guide
Tutorial memasang DNS Nawala Nawala Guide
- Klik start �> Control Panel
- Klik 2x Network Connections
- Klik kanan Network Connections yang anda pakai untuk mengakses internet, lalu pilih properties
- Pilih Internet Protocol [TCP/IP] lalu klik properties.
- Klik Use the Following DNS Addresses, isi kotaknya dengan
Preferred DNS Server : 180.131.144.144
Alternate DNS Server : 180.131.145.145
Kata Pencarian
- DNS kode nawala
- cara pasang nawala
- nawala ip
- internet nawala
- internet aman anak
---------------------------Dont Forget To Help And Support My BLOG
CopyRight.By-zeromin0.blogspot.com
download file now
Thursday, August 24, 2017
Tweaking dhcp client configuration to change the default DNS servers to Open DNS
Tweaking dhcp client configuration to change the default DNS servers to Open DNS
The DNS servers of my ISP is always behaving erratically. The DNS look up times are abysmally large and some times I get an address not found error while browsing. On ubuntu/debian systems the DNS servers are specified in /etc/resolv.conf. I tried to edit /etc/resolv.conf and put open dns servers as default DNS servers. But, my ISP supplies their DNS server address along with IP address for the system via DHCP. Every time my system renews its DHCP lease. my /etc/resolv.conf is also rewritten with their DNS address.
My /etc/resolv.conf ( supplied by ISP) looks like this.
$ cat /etc/resolv.conf
domain asianetindia.com
search asianetindia.com
nameserver 202.88.238.3
nameserver 202.88.238.5
nameserver 202.88.231.2
There is a trick I used to make Open DNS servers as my default DNS server.
Edit /etc/dhcp3/dhclient.conf and look for the line.
#prepend domain-name-servers 127.0.0.1;
Add the following line immediately below the above line.
prepend domain-name-servers 208.67.222.222;
prepend domain-name-servers 208.67.220.220;
You can also put any other DNS servers.
Now renew the lease with
$ sudo dhclient eth0
The new /etc/resolve.conf looks like this.
$ cat /etc/resolv.conf
domain asianetindia.com
search asianetindia.com
nameserver 208.67.220.220
nameserver 208.67.222.222
nameserver 202.88.238.3
nameserver 202.88.238.5
nameserver 202.88.231.2
DNS look up is made from open dns.
download file now
Sunday, August 13, 2017
Tsunami DNS Amplification Attack Tool
Tsunami DNS Amplification Attack Tool
Tsunami is a DNS Amplification Attack Tool which is collected from the internet and modified by Samiux. It is designed for testing your server and/or network under the DNS Amplification Attack. Perform this test on any server and/or network without authorization is a crime and you will be put into a jail.
The number of open recursive DNS servers and the bandwidth of the attacker as well as duration may affect the traffic volume size of the attack.
Tsunami is working perfectly on Kali Linux 1.0.7 or above. The official site is at here.
Usage
To perform DNS Amplification attack :
python amplfiy.py -t 1.2.3.4 -s open_dns.txt -a domain_name.txt -c -1 --verify -v --threads=1000
*where 1.2.3.4 is the victims IP address
To scan for the open recursive DNS server :
perl find_open_resolvers.pl 1.0.0.0 - 1.84.255.255 -q 1000
Remarks : this script just can check if the DNS server has the RA flag or not only. You need to double check with the following command to confirm the scanned DNS server is a true open recursive DNS server.
dig ANY isc.org @samsung.idv.tw
*where samsung.idv.tw is the open recursive DNS server
where isc.org is the domain to lookup
Tsunami comes with the following files :
amplfiy.py - the attack script
find_open_resolvers.pl - the scanner script
gov-uk_domain.txt - domain names of UK Government
open_dns_1.0.0.0-1.84.255.255.txt - open recursive DNS list within 1.0.0.0 and 1.84.255.255 IP range
Thats all! See you.
download file now
Labels:
amplification,
attack,
dns,
tool,
tsunami
Tuesday, August 8, 2017
Subscribe to:
Posts (Atom)