a passive dns drive-by tool 🏎️💨
Go to file
Dionysus a69ba1cbc8
Memory efficency attained via generators for handling larger input files. Code cleaned up, etc
2024-02-10 02:17:19 -05:00
.screens Readme updated 2023-11-27 20:04:17 -05:00
logs Updated mirrors in README and added ISP DNS list 2024-01-29 16:57:02 -05:00
resolvers Memory efficency attained via generators for handling larger input files. Code cleaned up, etc 2024-02-10 02:17:19 -05:00
README.md Memory efficency attained via generators for handling larger input files. Code cleaned up, etc 2024-02-10 02:17:19 -05:00
dns_keys.txt Updated mirrors in README and added ISP DNS list 2024-01-29 16:57:02 -05:00
pdknockr.py Memory efficency attained via generators for handling larger input files. Code cleaned up, etc 2024-02-10 02:17:19 -05:00
subdomains.txt Memory efficency attained via generators for handling larger input files. Code cleaned up, etc 2024-02-10 02:17:19 -05:00

README.md

pdKnockr

A passive DNS "drive-by" tool

This tool is designed to detect passive DNS servers that are logging DNS queries by performing targeted subdomain lookups on a list of specified DNS resolvers. The core functionality of the program lies in its ability to generate unique subdomains using a seed value, ensuring that each query is distinct and traceable. This approach is particularly effective in identifying passive DNS servers, which typically log and store DNS queries for analysis and tracking purposes. By generating these unique queries, the tool can pinpoint which DNS resolvers are passively logging requests, a critical insight for network security analysis and privacy assessments.

The program operates by accepting a list of DNS resolver addresses and a seed value for subdomain generation. It then asynchronously queries each resolver with a dynamically generated subdomain, based on the provided seed, targeting a specific domain. The asynchronous nature of the tool allows for high-throughput and efficient querying, making it suitable for scanning a large number of resolvers in a short period. Users should note that while this tool provides valuable insights into DNS logging practices, it should be used responsibly and in compliance with applicable network and privacy regulations. It serves as a powerful instrument for network administrators, security researchers, and privacy advocates to understand and evaluate the extent of passive DNS logging in their networks or across various resolvers.

TLDR; DNS TRAFFIC IS BEING LOGGED GLOBALLY AND SOLD TO THREAT INTEL COMPANIES, WHO THEN PAYWALL THAT DATA. DO SOMETHING ABOUT IT.

How it works

When the program starts, it will generate a unique subdomain for each resolver.

This list is saved as JSON data in a dns_keys.txt file.

Th program will start firing off DNS queries to all the resolvers using the custom subdomain we made for each one:

After testing across multiple IP addresses over time, if we ever see download.event.supernets.org show up on any passive DNS lookup engines, refer to our logs, which will show it was looked up on 151.202.0.84, marking it as a DNS server that is actively logging all DNS queries that pass through.

WORK IN PROGRESS (STAY TUNED)

  • Bind server running accepting wildcard DNS lookups on custom domain.
  • DNS-over-TLS (DoT) and DNS-over-HTTPS (DoH) support
  • Hunt down specific DNS servers used by ISP's from an ASN lookup
  • Any way to apply this to custom DNS servers used by VPNs?
  • Noise generator to abuse known logging servers.
  • Memory effiency attains via yielding generators to handle large input files

This is all very theoretical right now, interested to see how this pans out.

Stats and proof coming soon. Get fucking fucked white-ops 💯


Mirrors for this repository: acid.vegasSuperNETsGitHubGitLabCodeberg