DNSObserver is a handy DNS service written in Go to aid in the detection of several types of blind vulnerabilities. It monitors a pentester’s server for out-of-band DNS interactions and sends notifications with the received request’s details via Slack. DNSObserver can help you find bugs such as blind OS command injection, blind SQLi, blind XXE, and many more!
Setup
What you’ll need:
Domain and DNS Configuration
If you don’t already have a VPS ready to use, create a new Linux VPS with your preferred provider. Note down its public IP address.
Register a new domain name with your preferred registrar – any registrar should be fine as long as they allow setting custom name servers and glue records.
Go into your new domain’s DNS settings and find the ‘glue record’ section. Add two entries here, one for each new name server, and supply both with the public IP address of your VPS.
Next, change the default name servers to:
ns1. <YOUR-DOMAIN>
ns2. <YOUR-DOMAIN>
Server Setup
SSH into your VPS, and perform these steps:
sudo ufw allow 53/udp
sudo ufw allow 53/tcp
Get DNSObserver and its dependencies:
go get github.com/allyomalley/dnsobserver/…
DNSObserver Configuration
There are two required arguments, and two optional arguments:
a_records:
– hostname: “”
ip: “”
– hostname: “”
ip: “”
Currently, the tool only uses A records – in the future I may add in CNAME, AAAA, etc). Here is an example of a complete custom records file:
a_records:
– hostname: “google.com”
ip: “1.2.3.4”
– hostname: “github.com”
ip: “5.6.7.8”
These settings mean that I want to respond to queries for ‘google.com’ with ‘1.2.3.4’, and queries for ‘github.com’ with ‘5.6.7.8’.
Usage
Now, we are ready to start listening! If you want to be able to do other work on your VPS while DNSObserver runs, start up a new tmux session first.
For the standard setup, pass in the required arguments and your webhook:
dnsobserver –domain example.com –ip 11.22.33.44 –webhook https://hooks.slack.com/services/XXX/XXX/XXX
To achieve the above, but also include some custom A lookup responses, add the argument for your records file:
dnsobserver –domain example.com –ip 11.22.33.44 –webhook https://hooks.slack.com/services/XXX/XXX/XXX –recordsFile my_records.yml
Assuming you’ve set everything up correctly, DNSObserver should now be running. To confirm it’s working, open up a terminal on your desktop and perform a lookup of your new domain (‘example.com’ in this demo):
dig example.com
You should now receive a Slack notification with the details of the request!
shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…
Extract and execute a PE embedded within a PNG file using an LNK file. The…
Embark on the journey of becoming a certified Red Team professional with our definitive guide.…
This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…
This took me like 4 days (+2 days for an update), but I got it…
MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection. Its foundation is…