Brannon Dorsey

Results 87 comments of Brannon Dorsey

Great, I'm a bit swamped this week but should be able to get on this and hopefully make a PR by early next week.

Hey @trinitronx, thanks so much for your interest in this project! It was great to meet you this weekend as well. I wish I had a chance to chat a...

Thanks for getting back to me. I've been playing with FakeDNS for the past few days, and I've got to say, really nice work :+1:. I see that [this behavior...

One solution would be to include a `--unique-by ` cli param. `--unique-by ip` is the current behavior as is. `--unique-by subdomain` would be the version I've got in my fork,...

No problem, thanks for making such a rad tool. I'll be using it in my research for a while and I'm happy to help with development and discussion along the...

Great to hear you are on bored with this functionality :+1:. Rot13 sounds like a nice solution for obfuscation, especially considering it doesn't add any extra characters. It would probably...

> FAKEDNS.A.example.com.BD.27.2A.59.attacker.domain - `FAKEDNS` makes sense to have a constant here, but would that have to be "FAKEDNS"? Or is the goal just to signify that the domain name is...

> I wonder if there are legitimate uses for such a service? Something something something cloudflare. How exactly do you mean legitimate? Penetration testing would def be my most use...

It looks like Tavis Ormandy's [rbndr](https://github.com/taviso/rbndr) actually provides this type of functionality. He's got a public server up that allows anyone to use his malicious DNS server too: https://lock.cmpxchg8b.com/rebinder.html Granted,...

Hey @Crypt0s, I've implemented this basic functionality as a standalone DNS server called [`whonow`](https://github.com/brannondorsey/whonow). I opted for the human-readable version of the automangler rules proposed and went with a keep-it-simple-stupid...