offensive-security / kali-nethunter

The Kali NetHunter Project
https://github.com/offensive-security/kali-nethunter/wiki
3.49k stars 891 forks source link

dns possibility in hid attacks powersploit ip-address field #92

Closed ajmtrz closed 9 years ago

ajmtrz commented 9 years ago

please, dns input but also ip address number.

ghost commented 9 years ago

you can check out this for dns spoofing and creating a backdoor in seconds https://github.com/samyk/usbdriveby

offensive-security commented 9 years ago

Use of IPs is a limitation metasploit payloads, closing.

ajmtrz commented 9 years ago

False, metasploit payloads PERMITS dns targets.

offensive-security commented 9 years ago

Not in the process of generating shellcode, unless you can show me otherwise?

ajmtrz commented 9 years ago

msfpayload and msfvenom you can use LHOST=dinamic-ip.server.com, both payload/meterpreter/reverse-http and payload/meterpreter/reverse-https

ajmtrz commented 9 years ago

thanks

offensive-security commented 9 years ago

The DNS name gets resolved to an IP before use in the shellcode, which is how it is implemented in our payloads. Either way, this is not a feature we will be implementing ourselves, you are welcome to submit a patch if you like.