Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

https://github.com/al-azif/exploit-host-dns

Docker based DNS component of the Exploit Host
https://github.com/al-azif/exploit-host-dns

docker server shell

Last synced: 8 days ago
JSON representation

Docker based DNS component of the Exploit Host

Awesome Lists containing this project

README

        

# Exploit Host DNS

Purpose made DNS Docker file setup for hosting exploits for the web browser for Sony PlayStation devices and the Nintendo Wii/WiiU/Switch.

## Features

### Stand Alone

- Blocks telemetry
- Blocks system updates
- Blocks PlayStation title updates
- Blocks metadata domain, but raw PKG links resolve. Third party tools like OrbisPatches will function
- Pass through for remainder of the internet
- Obviously Sony/Nintendo domains will not resolve
- Access control list for Blacklisting IPs completely and/or Whitelisting IPs for recursive queries

### With Exploit Host HTTP

When used in conjunction with [Exploit Host HTTP](https://github.com/Al-Azif/exploit-host-http) the following additional features are added:

- Enables internet speed tests
- Enables serving custom system updates
- Hijacks default browser landing pages

## Usage

### Command Line

This command will always pull the latest image from Docker Hub, run on the main Docker bridge network, redirect hijacked domains to `192.0.2.2`, IPv6 is disabled (As it's not explicitly enabled), and it will restart if it's not running until you explicitly tell it to stop.

`docker run -d --network bridge -p 53:53/tcp -p 53:53/udp -e REDIRECT_IPV4=192.0.2.2 --restart unless-stopped --pull always alazif/exploit-host-dns:latest`

### Composer

This composer file will do the same as the command above.

```yml
---
version: "3.8"

services:
exploit-host-dns:
image: alazif/exploit-host-dns:latest
network_mode: bridge
ports:
- 53:53/tcp
- 53:53/udp
environment:
REDIRECT_IPV4: 192.0.2.2
pull_policy: always
restart: unless-stopped
```

Start the compose file by calling `docker compose up -d` from the same location as the composer file.

## Options (Environment Variables)

| Option | Default | Type | Info |
|:-------------------|:--------------|:--------|:-----------------------------|
| DEBUG | `false` | boolean | Show debug output for `entrypoint.sh` in the Docker log. |
| AUTOUPDATE_ZONES | `false` | boolean | Update the zone files automatically if `/opt/dns-config-watchdog/zones.json` is modified. |
| SMART_WATCHER | `false` | boolean | How modifications to `/opt/dns-config-watchdog/zones.json` are checked. If `true` uses Python's Watchdog package. If `false` uses a looped shell command to watch for changes. Ignored if `AUTOUPDATE_ZONES` is `false`. |
| LOGGING | `false` | boolean | Enable DNS logging. Logged to `/var/log/named/`. |
| DNS_RESTART | `rndc reload` | string | The command issued within `/opt/dns-config-watchdog/main.py` to restart the DNS server after generating zone files. |
| REDIRECT_IPV4 | none | string | Must have an IPv4, an IPv6, or both specified. This is the address which hijacked domains will be forwarded to. |
| REDIRECT_IPV6 | none | string | Must have an IPv4, an IPv6, or both specified. This is the address which hijacked domains will be forwarded to. |

## TODO

- [ ] Double check/separate IPv4 vs IPv6 support better. Don't assume IPv4 is supported if IPv6 is on, etc.
- [ ] Test Nintendo Wii/WiiU/Switch support.
- [ ] Add/Test Xbox support.