Used to detect CNAME Cloaking on recorded browsing sessions
Methodology:
- Read recorded pcap file
- Parse the pcap files for DNS requests that may show possible CNAME cloaking
- Download and parse (regex style) an update AgGuard filterlist
- Filter out tracking domains that are not hiding
- Locate domain(s) that use CNAME Cloaking
- Pretty print the results
Install requirements.txt
Insert pcap file as my_pcap2.pcap
in the main directory, or use default pcap file
Run main.py
in terminal with no arguments
Original Subdomain | DNS resolved Domain | Cloaking |
---|---|---|
<DNS_SCHEME>.URL | <DNS_SCHEME>.URL | Boolean |
Original Subdomain | DNS resolved Domain | Cloaking |
---|---|---|
smetrics.redhat.com. |
redhat.com.ssl.sc.omtrdc.net |
True |
smetrics.redhat.com. |
redhat.com.ssl.sc.omtrdc.net |
True |
- Duplicate CNAME Claoking domains will appear
Code is not authoirized for use by any third-parties unless explicit permission is given by the author.