Skip to content

Latest commit

 

History

History
59 lines (43 loc) · 2.22 KB

README.md

File metadata and controls

59 lines (43 loc) · 2.22 KB

DNS-Sniffer

Description

This Python script uses the scapy library to sniff DNS queries and responses. The tool captures UDP datagrams on port 53, both from the source and destination, allowing for real-time DNS traffic monitoring.

Features

  • Sniffs DNS queries and responses on the network.
  • Displays packet details such as source and destination IPs.
  • Color-coded output for better readability using colorama.
  • User-friendly command-line interface with argparse for specifying the network interface.

Tested on

  • Kali LXDE Linux

Installation

Before running the script, you need to install the required dependencies. Specifically, make sure to install Scapy by following the installation guide at: Scapy Installation Guide

Additionally, install colorama for colorized output:

pip install colorama

Usage

Ensure you run the script with super-user permissions since scapy requires administrative access for network sniffing.

sudo ./dnsSniffer.py -i <network_interface>

Replace <network_interface> with the actual interface name (e.g., eth0, wlan0).

Example:

sudo ./dnsSniffer.py -i eth0

Original Author

  • By am0nt031r0

Updated and Enhanced by

  • Halil İbrahim, denizhalil.com

This updated version includes a refactor with improved structure, better error handling, colorized output, and argparse integration for enhanced functionality.

Check Out My Books

Join the Community

Feel free to join our Production Brain Discord server to discuss cybersecurity, Python projects, and more:
Join Production Brain Discord

This project continues to grow with community feedback and contributions!