DNS Spoofing

DNS spoofing to 220.134.41.144 / ::ffff:dc86:2990 if dns request name in block list

<run>
    <filter id="1" sessionBase="no" alt="DNS block list">
        <or>
            <find name="dns.qry.name" relation="==" content="www.abc.com"/>
            <find name="dns.qry.name" relation="==" content="www.def.com"/>
        </or>
    </filter>
    <filter id="2" sessionBase="no" alt="dns request">
        <or>
            <find name="dns.flags.response" relation="==" content="0"/>
        </or>
    </filter>
    <filter id="3" sessionBase="no" alt="dns type A and not EDNS">
        <and>
            <find name="dns.qry.type" relation="==" content="1"/>
            <find n="dns.count.add_rr" r="==" c="0"/>
        </and>
    </filter>
    <filter id="4" sessionBase="no" alt="dns type AAAA and not EDNS">
        <and>
            <find name="dns.qry.type" relation="==" content="28"/>
            <find n="dns.count.add_rr" r="==" c="0"/>
        </and>
    </filter>
    <output id="2">
        <port>P6</port>
        <dns_response_ipv4>220.134.41.144</dns_response_ipv4>
    </output>
    <output id="3">
        <port>P6</port>
        <dns_response_ipv6>::ffff:dc86:2990</dns_response_ipv6>
    </output>
    <chain>
        <in>P7</in>
        <out>P6</out>
    </chain>
    <chain>
        <in>P6</in>
        <fid>F1</fid>
        <next>
            <fid>F2</fid>
            <next>
                <fid>F3</fid>
                <out>O2</out>
                <next type="notmatch">
                    <fid>F4</fid>
                    <out>O3</out>
                </next>
            </next>
        </next>
        <next type="notmatch">
            <out>P7</out>
        </next>
    </chain>
</run>

Last updated