Skip to content

MattCarothers/liar

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

7 Commits
 
 
 
 
 
 

Repository files navigation

liar

Liar is a python/scapy script that listens for DNS requests, checks them against a block list, and spoofs back a fake response. Its intended purpose is blocking malicious domains.

It depends on the scapy packet manipulation library. http://www.secdev.org/projects/scapy/

Usage: liar.py -i <interface> -f <blacklist file> [-d]

Reads a list of domains from a text file and sends back spoofed DNS responses for requests to them. Designed for an environment in which an intrusion detection system sees DNS traffic via a passive tap and cannot block packets directly. Runs in the foreground unless -d is specified.

Each line of the block list should consists of a domain, an IP, and an optional TTL separated by whitespace. For example:

badguymalwaredownload.com 127.0.0.1 86400

The above looks for requests for badguymalwaredownload.com and spoofs a response pointing to 127.0.0.1 with a TTL of 86400 seconds

About

DNS spoofing daemon

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages