https://github.com/aatlasis/Pholus
A multicast DNS and DNS Service Discovery Security Assessment Tool
https://github.com/aatlasis/Pholus
Last synced: 4 months ago
JSON representation
A multicast DNS and DNS Service Discovery Security Assessment Tool
- Host: GitHub
- URL: https://github.com/aatlasis/Pholus
- Owner: aatlasis
- License: other
- Created: 2018-08-09T13:57:05.000Z (over 7 years ago)
- Default Branch: master
- Last Pushed: 2023-12-07T12:45:56.000Z (almost 2 years ago)
- Last Synced: 2024-11-21T14:38:07.597Z (12 months ago)
- Language: Python
- Size: 1.73 MB
- Stars: 67
- Watchers: 3
- Forks: 20
- Open Issues: 5
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
- awesome-hacking-lists - aatlasis/Pholus - A multicast DNS and DNS Service Discovery Security Assessment Tool (Python)
README
# Pholus
A multicast DNS and DNS Service Discovery Security Assessment Tool
It can perform recconnaisance, Denial of Service, Man in the Middle attacks
## Scan passively
Scan passively (for amount of timeout)
python pholus3.py eth0 -stimeout 60
## Discovery of available services
Sends a DNS query for PTR records with the name "_services._dns-sd._udp.";
this yields a set of PTR records where the rdata of each PTR record is the two-label
name plus the same domain, e.g., "_http._tcp.".
By sending such a query, we can automatically discover all the services advertised in the network.
python pholus3.py eth0 -sscan
#If you want to perform the scan both for IPv4 and IPv6:
python pholus3.py eth0 -sscan -4 -6
#You can also spoof the souce address to perform this reconnaissance in a stealthy way.
python pholus3.py eth0 -sscan -s4 192.168.2.30
## Send mdns request
python pholus3.py eth0 --request
## Perform a scan using reverse mDNS by providing a subnet
python pholus3.py eth0 -rdns_scanning 192.168.2.0/24
## Send automatically fake responses
python pholus3.py eth0 -afre -stimeout 100
## further MiTM (and other) capabilities
use --help to identify specific spoofing capabilities for MiTM purposes, eg -printer)
## Read a pcap file and pring mDNS info (no sudo/root required)
python pholus3.py ../mdns_traffic.pcap --readpcap