| __init__(self, victim_server, spoofed_domain, attacker_ip, authoritative_ns, initial_id=None, sport=53, ttl=30000, victim_mac=None, nic_interface=None, socket=None, attack_type=AttackType.NORMAL, interrupt_handler=None, log=lambda msg:None) | dns_poisoning.DNSPoisoning | |
| attack_type | dns_poisoning.DNSPoisoning | |
| attacker_ip | dns_poisoning.DNSPoisoning | |
| auth_nameserver | dns_poisoning.DNSPoisoning | |
| create_socket(self, interface) | dns_poisoning.DNSPoisoning | |
| faster_flooding(self, victim_mac=None, nic_interface=None) | dns_poisoning.DNSPoisoning | |
| flood_pool (defined in dns_poisoning.DNSPoisoning) | dns_poisoning.DNSPoisoning | |
| flood_socket (defined in dns_poisoning.DNSPoisoning) | dns_poisoning.DNSPoisoning | |
| get_classical_response(self, ID=None, victim_mac=None) | dns_poisoning.DNSPoisoning | |
| get_dan_response(self, ID=None, victim_mac=None) | dns_poisoning.DNSPoisoning | |
| id (defined in dns_poisoning.DNSPoisoning) | dns_poisoning.DNSPoisoning | |
| interrupt_handler | dns_poisoning.DNSPoisoning | |
| log | dns_poisoning.DNSPoisoning | |
| nic_interface | dns_poisoning.DNSPoisoning | |
| open_socket(self) | dns_poisoning.DNSPoisoning | |
| random_url | dns_poisoning.DNSPoisoning | |
| set_attack_type(self, attack_type) | dns_poisoning.DNSPoisoning | |
| set_id(self, id) | dns_poisoning.DNSPoisoning | |
| set_interface(self, interface) | dns_poisoning.DNSPoisoning | |
| set_random_url(self, url) | dns_poisoning.DNSPoisoning | |
| set_victim_mac(self, victim_mac) | dns_poisoning.DNSPoisoning | |
| source_port | dns_poisoning.DNSPoisoning | |
| spoofed_domain | dns_poisoning.DNSPoisoning | |
| sport | dns_poisoning.DNSPoisoning | |
| start_flooding(self, number_of_guess=2, spacing=None, socket=None) | dns_poisoning.DNSPoisoning | |
| stop_handler(self, sig, frame) | dns_poisoning.DNSPoisoning | |
| ttl | dns_poisoning.DNSPoisoning | |
| victim_mac (defined in dns_poisoning.DNSPoisoning) | dns_poisoning.DNSPoisoning | |
| victim_server | dns_poisoning.DNSPoisoning | |