Used to detect CNAME Cloaking on recorded browsing sessions
Methodology:
- Read recorded pcap file
- Parse the pcap files for DNS requests that may show possible CNAME cloaking
- Download and parse (regex style) an update AgGuard filterlist
- Filter out tracking domains that are not hiding
- Locate domain(s) that use CNAME Cloaking
- Pretty print the results
Install requirements.txt
Insert pcap file as my_pcap2.pcap in the main directory, or use default pcap file
Run main.py in terminal with no arguments
| Original Subdomain | DNS resolved Domain | Cloaking |
|---|---|---|
| <DNS_SCHEME>.URL | <DNS_SCHEME>.URL | Boolean |
| Original Subdomain | DNS resolved Domain | Cloaking |
|---|---|---|
smetrics.redhat.com. |
redhat.com.ssl.sc.omtrdc.net |
True |
smetrics.redhat.com. |
redhat.com.ssl.sc.omtrdc.net |
True |
- Duplicate CNAME Claoking domains will appear
Code is not authoirized for use by any third-parties unless explicit permission is given by the author.
:max_bytes(150000):strip_icc()/GettyImages-585297068-52005387a57248a19e3ee29bc1af44b4.jpg)