Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
sqlmapproject
GitHub Repository: sqlmapproject/sqlmap
Path: blob/master/lib/request/dns.py
3554 views
1
#!/usr/bin/env python
2
3
"""
4
Copyright (c) 2006-2026 sqlmap developers (https://sqlmap.org)
5
See the file 'LICENSE' for copying permission
6
"""
7
8
from __future__ import print_function
9
10
import binascii
11
import os
12
import re
13
import socket
14
import struct
15
import threading
16
import time
17
18
class DNSQuery(object):
19
"""
20
>>> DNSQuery(b'|K\\x01 \\x00\\x01\\x00\\x00\\x00\\x00\\x00\\x01\\x03www\\x06google\\x03com\\x00\\x00\\x01\\x00\\x01\\x00\\x00)\\x10\\x00\\x00\\x00\\x00\\x00\\x00\\x0c\\x00\\n\\x00\\x08O4|Np!\\x1d\\xb3')._query == b"www.google.com."
21
True
22
>>> DNSQuery(b'\\x00')._query == b""
23
True
24
"""
25
26
def __init__(self, raw):
27
self._raw = raw
28
self._query = b""
29
30
try:
31
type_ = (ord(raw[2:3]) >> 3) & 15 # Opcode bits
32
33
if type_ == 0: # Standard query
34
i = 12
35
j = ord(raw[i:i + 1])
36
37
while j != 0:
38
self._query += raw[i + 1:i + j + 1] + b'.'
39
i = i + j + 1
40
j = ord(raw[i:i + 1])
41
except TypeError:
42
pass
43
44
def response(self, resolution):
45
"""
46
Crafts raw DNS resolution response packet
47
"""
48
49
retVal = b""
50
51
if self._query:
52
retVal += self._raw[:2] # Transaction ID
53
retVal += b"\x85\x80" # Flags (Standard query response, No error)
54
retVal += self._raw[4:6] + self._raw[4:6] + b"\x00\x00\x00\x00" # Questions and Answers Counts
55
retVal += self._raw[12:(12 + self._raw[12:].find(b"\x00") + 5)] # Original Domain Name Query
56
retVal += b"\xc0\x0c" # Pointer to domain name
57
retVal += b"\x00\x01" # Type A
58
retVal += b"\x00\x01" # Class IN
59
retVal += b"\x00\x00\x00\x20" # TTL (32 seconds)
60
retVal += b"\x00\x04" # Data length
61
retVal += b"".join(struct.pack('B', int(_)) for _ in resolution.split('.')) # 4 bytes of IP
62
63
return retVal
64
65
class DNSServer(object):
66
"""
67
Used for making fake DNS resolution responses based on received
68
raw request
69
70
Reference(s):
71
https://code.activestate.com/recipes/491264-mini-fake-dns-server/
72
https://web.archive.org/web/20150418152405/https://code.google.com/p/marlon-tools/source/browse/tools/dnsproxy/dnsproxy.py
73
"""
74
75
def __init__(self):
76
self._check_localhost()
77
self._requests = []
78
self._lock = threading.Lock()
79
80
try:
81
self._socket = socket._orig_socket(socket.AF_INET, socket.SOCK_DGRAM)
82
except AttributeError:
83
self._socket = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
84
85
self._socket.setsockopt(socket.SOL_SOCKET, socket.SO_REUSEADDR, 1)
86
self._socket.bind(("", 53))
87
self._running = False
88
self._initialized = False
89
90
def _check_localhost(self):
91
response = b""
92
s = None
93
94
try:
95
s = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
96
s.settimeout(1.0)
97
s.connect(("", 53))
98
s.send(binascii.unhexlify("6509012000010000000000010377777706676f6f676c6503636f6d00000100010000291000000000000000")) # A www.google.com
99
response = s.recv(512)
100
except:
101
pass
102
finally:
103
if s:
104
s.close()
105
106
if response and b"google" in response:
107
raise socket.error("another DNS service already running on '0.0.0.0:53'")
108
109
def pop(self, prefix=None, suffix=None):
110
"""
111
Returns received DNS resolution request (if any) that has given
112
prefix/suffix combination (e.g. prefix.<query result>.suffix.domain)
113
"""
114
115
retVal = None
116
117
if prefix and hasattr(prefix, "encode"):
118
prefix = prefix.encode()
119
120
if suffix and hasattr(suffix, "encode"):
121
suffix = suffix.encode()
122
123
with self._lock:
124
for _ in self._requests:
125
if prefix is None and suffix is None or re.search(b"%s\\..+\\.%s" % (prefix, suffix), _, re.I):
126
self._requests.remove(_)
127
retVal = _.decode()
128
break
129
130
return retVal
131
132
def run(self):
133
"""
134
Runs a DNSServer instance as a daemon thread (killed by program exit)
135
"""
136
137
def _():
138
try:
139
self._running = True
140
self._initialized = True
141
142
while True:
143
data, addr = self._socket.recvfrom(1024)
144
_ = DNSQuery(data)
145
self._socket.sendto(_.response("127.0.0.1"), addr)
146
147
with self._lock:
148
self._requests.append(_._query)
149
150
except KeyboardInterrupt:
151
raise
152
153
finally:
154
self._running = False
155
156
thread = threading.Thread(target=_)
157
thread.daemon = True
158
thread.start()
159
160
if __name__ == "__main__":
161
server = None
162
try:
163
server = DNSServer()
164
server.run()
165
166
while not server._initialized:
167
time.sleep(0.1)
168
169
while server._running:
170
while True:
171
_ = server.pop()
172
173
if _ is None:
174
break
175
else:
176
print("[i] %s" % _)
177
178
time.sleep(1)
179
180
except socket.error as ex:
181
if 'Permission' in str(ex):
182
print("[x] Please run with sudo/Administrator privileges")
183
else:
184
raise
185
except KeyboardInterrupt:
186
os._exit(0)
187
finally:
188
if server:
189
server._running = False
190
191