A modified version of cujanovic's dns.py for DNS Rebinding attacks. https://github.com/cujanovic/SSRF-Testing/blob/master/dns.py
sudo python3 dns-rebinder.py Whitelisted_IP Rebind_IP Server_IP Port Domain
- Whitelisted_IP: IP that the target application likes
- Rebind_IP: IP you want to switch to for the rebind attack
- Server_IP: Server you're running the script on
- Port: usually 53
- Domain: Domain you're using to rebind attack.
sudo python3 dns-rebinder.py 8.8.8.8 127.0.0.1 x.x.x.x 53 attacker.com
test it out :)
dig anything.attacker.com
It will resolve to the whitelisted IP first, then the rebind IP on the 2nd(ish) resolve.