DNS Response Spoofing [Документация VAS Experts]

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
en:dpi:dpi_options:dns_substitution [2025/07/24 13:02] elena.krasnobryzhen:dpi:dpi_options:dns_substitution [2025/07/24 13:04] (current) – [Configuration] elena.krasnobryzh
Line 23: Line 23:
  
 =====Configuration===== =====Configuration=====
-  - Create a text file and add DNS spoofing rules specifying the domain name, DNS record type, and IP address to be returned for that domain. Wildcard domains with * are supported. <code bash>vi test.txt+  - Create a text file and add DNS spoofing rules specifying the domain name, DNS record type, and IP address to be returned for that domain. Wildcard domains with ''*'' are supported. <code bash>vi test.txt
 google.com A 192.0.2.1 google.com A 192.0.2.1
-test.ru A #nxdomain+test.com A #nxdomain
 example.com AAAA 2001:db8:85a3::8a2e:370:7334 example.com AAAA 2001:db8:85a3::8a2e:370:7334
-ya.ru HTTPS #drop+yahoo.com HTTPS #drop
 *.fb.com A 203.0.113.5 *.fb.com A 203.0.113.5
-mail.ru MX smtp.googlemail.com+outlook.com MX smtp.googlemail.com
 </code> </code>
   - Convert the text file to binary format using the ''dns2dic'' utility, which is readable by DPI:<code bash>cat test.txt|dns2dic test.bin</code>   - Convert the text file to binary format using the ''dns2dic'' utility, which is readable by DPI:<code bash>cat test.txt|dns2dic test.bin</code>