Singularity of Origin DNS Rebinding Attack
This attack typically takes ~1 min to work. This duration can be reduced to ~3s with the appropriate options. Check the
documentation
. Try the new, experimental HTTP port
scanner
.
Attack Host Domain
Attack Host
Target Host
Target Port
Attack server listening on:
unknown
. The attack and target hosts must be listening on the same port. The "Request New Port" button is only available when the server is started with the "-dangerouslyAllowDynamicHTTPServers" command line argument.
Attack Payload
Dummy Port
Specify a port on which the attack host does not listen to permit browser fast DNS cache eviction. If not possible, use a reachable port serviced by a web server.
Rebinding Strategy
First then second (default, conservative)
Multiple answers (fast)
Round robin (IPS/filters evasion)
Random (IPS/filters evasion)
Read the docs if changing from the default value to ensure that the attack will succeed.
Interval
How long to wait between attempts in seconds.
Index Token
The attack uses this string to recognize whether it is accessing the attacker or target host. it must be placed in the index page of the attacker web server.
Please wait for DNS cache entries to expire.