__init__(self, victim_server, spoofed_domain, attacker_ip, authoritative_ns, initial_id=None, sport=53, ttl=30000, victim_mac=None, nic_interface=None, socket=None, attack_type=AttackType.NORMAL, interrupt_handler=None, log=lambda msg:None) | dns_poisoning.DNSPoisoning | |
attack_type | dns_poisoning.DNSPoisoning | |
attacker_ip | dns_poisoning.DNSPoisoning | |
auth_nameserver | dns_poisoning.DNSPoisoning | |
create_socket(self, interface) | dns_poisoning.DNSPoisoning | |
faster_flooding(self, victim_mac=None, nic_interface=None) | dns_poisoning.DNSPoisoning | |
flood_pool (defined in dns_poisoning.DNSPoisoning) | dns_poisoning.DNSPoisoning | |
flood_socket (defined in dns_poisoning.DNSPoisoning) | dns_poisoning.DNSPoisoning | |
get_classical_response(self, ID=None, victim_mac=None) | dns_poisoning.DNSPoisoning | |
get_dan_response(self, ID=None, victim_mac=None) | dns_poisoning.DNSPoisoning | |
id (defined in dns_poisoning.DNSPoisoning) | dns_poisoning.DNSPoisoning | |
interrupt_handler | dns_poisoning.DNSPoisoning | |
log | dns_poisoning.DNSPoisoning | |
nic_interface | dns_poisoning.DNSPoisoning | |
open_socket(self) | dns_poisoning.DNSPoisoning | |
random_url | dns_poisoning.DNSPoisoning | |
set_attack_type(self, attack_type) | dns_poisoning.DNSPoisoning | |
set_id(self, id) | dns_poisoning.DNSPoisoning | |
set_interface(self, interface) | dns_poisoning.DNSPoisoning | |
set_random_url(self, url) | dns_poisoning.DNSPoisoning | |
set_victim_mac(self, victim_mac) | dns_poisoning.DNSPoisoning | |
source_port | dns_poisoning.DNSPoisoning | |
spoofed_domain | dns_poisoning.DNSPoisoning | |
sport | dns_poisoning.DNSPoisoning | |
start_flooding(self, number_of_guess=2, spacing=None, socket=None) | dns_poisoning.DNSPoisoning | |
stop_handler(self, sig, frame) | dns_poisoning.DNSPoisoning | |
ttl | dns_poisoning.DNSPoisoning | |
victim_mac (defined in dns_poisoning.DNSPoisoning) | dns_poisoning.DNSPoisoning | |
victim_server | dns_poisoning.DNSPoisoning | |