Dnschef: Fail to open log file?

The name of the pictureThe name of the pictureThe name of the pictureClash Royale CLAN TAG#URR8PPP











up vote
0
down vote

favorite












I'm usin dnschef in my Linux machine, but it gave me this error.



How to fix this issue?



     screenshot



Plus, I can use dnschef (which will use localhost network card lo by default) and it doesn't have such issue.







share|improve this question





















  • you haven’t provided the —logfile parameter, but it appears there are several issues with the software’s error reporting.
    – Jeff Schaller
    Jul 11 at 1:40














up vote
0
down vote

favorite












I'm usin dnschef in my Linux machine, but it gave me this error.



How to fix this issue?



     screenshot



Plus, I can use dnschef (which will use localhost network card lo by default) and it doesn't have such issue.







share|improve this question





















  • you haven’t provided the —logfile parameter, but it appears there are several issues with the software’s error reporting.
    – Jeff Schaller
    Jul 11 at 1:40












up vote
0
down vote

favorite









up vote
0
down vote

favorite











I'm usin dnschef in my Linux machine, but it gave me this error.



How to fix this issue?



     screenshot



Plus, I can use dnschef (which will use localhost network card lo by default) and it doesn't have such issue.







share|improve this question













I'm usin dnschef in my Linux machine, but it gave me this error.



How to fix this issue?



     screenshot



Plus, I can use dnschef (which will use localhost network card lo by default) and it doesn't have such issue.









share|improve this question












share|improve this question




share|improve this question








edited Jul 11 at 3:08









slm♦

233k65479651




233k65479651









asked Jul 11 at 1:21









Albert Zhang

172




172











  • you haven’t provided the —logfile parameter, but it appears there are several issues with the software’s error reporting.
    – Jeff Schaller
    Jul 11 at 1:40
















  • you haven’t provided the —logfile parameter, but it appears there are several issues with the software’s error reporting.
    – Jeff Schaller
    Jul 11 at 1:40















you haven’t provided the —logfile parameter, but it appears there are several issues with the software’s error reporting.
– Jeff Schaller
Jul 11 at 1:40




you haven’t provided the —logfile parameter, but it appears there are several issues with the software’s error reporting.
– Jeff Schaller
Jul 11 at 1:40










1 Answer
1






active

oldest

votes

















up vote
1
down vote













Take a look at this tutorial. It shows you the various ways you can use dnschef.




DNSChef is capable of storing activity log in an external file using the --logfile log1.txt command line parameter. Below is a snippet of a sample DNSChef session:




So something like this:



$ dnschef -i wlan0 --logfile /tmp/dnschef.log


The full usage



root@kali:~# dnschef -h
Usage: dnschef.py [options]:
_ _ __
| | version 0.1 | | / _|
__| |_ __ ___ ___| |__ ___| |_
/ _` | '_ / __|/ __| '_ / _ _|
| (_| | | | __ (__| | | | __/ |
__,_|_| |_|___/___|_| |_|___|_|
iphelix@thesprawl.org


DNSChef is a highly configurable DNS Proxy for Penetration Testers and Malware
Analysts. It is capable of fine configuration of which DNS replies to modify
or to simply proxy with real responses. In order to take advantage of the tool
you must either manually configure or poison DNS server entry to point to
DNSChef. The tool requires root privileges to run.

Options:
-h, --help show this help message and exit
--fakeip=192.168.1.100
IP address to use for matching DNS queries. If you use
this parameter without specifying domain names, then
all queries will be spoofed. Consider using --file
argument if you need to define more than one IP
address.
--fakedomains=thesprawl.org,google.com
A comma separated list of domain names which will be
resolved to a FAKE value specified in the --ip
parameter. All other domain names will be resolved to
their true values.
--truedomains=thesprawl.org,google.com
A comma separated list of domain names which will be
resolved to their TRUE values. All other domain names
will be resolved to a fake value specified in the --ip
parameter.
--nameservers=4.2.2.1,4.2.2.2
A comma separated list of alternative DNS servers to
use with proxied requests. A randomly selected server
from the list will be used for proxy requests. By
default, the tool uses Google's public DNS server
8.8.8.8.
--file=FILE Specify a file containing a list of DOMAIN=IP pairs
(one pair per line) used for DNS responses. For
example: google.com=1.1.1.1 will force all queries to
'google.com' to be resolved to '1.1.1.1'. You can be
even more specific by combining --file with other
arguments. However, data obtained from the file will
take precedence over others.
--interface=0.0.0.0 Define an interface to use for the DNS listener. For
example, use 127.0.0.1 to listen for only requests
coming from a loopback device.
--tcp Use TCP DNS proxy instead of the default UDP.
-q, --quiet Don't show headers.


Issue #10 - cannot open logfile



Your issue looks like it's actually a false positive though. The real error is this:




IOError code 13 (permission denied) is thrown on an attempt to bind to the default port 53 which requires the root permissions




I found that here in the upstream repo for dnschef - https://github.com/iphelix/dnschef/issues/10.



In the comments people are stating that this issue is still not resolved, and even when running dnschef as root, it's still reporting the error.



Bottom line



Sounds like a bug in dnschef.



References



  • https://tools.kali.org/sniffingspoofing/dnschef

  • https://github.com/iphelix/dnschef





share|improve this answer























    Your Answer







    StackExchange.ready(function()
    var channelOptions =
    tags: "".split(" "),
    id: "106"
    ;
    initTagRenderer("".split(" "), "".split(" "), channelOptions);

    StackExchange.using("externalEditor", function()
    // Have to fire editor after snippets, if snippets enabled
    if (StackExchange.settings.snippets.snippetsEnabled)
    StackExchange.using("snippets", function()
    createEditor();
    );

    else
    createEditor();

    );

    function createEditor()
    StackExchange.prepareEditor(
    heartbeatType: 'answer',
    convertImagesToLinks: false,
    noModals: false,
    showLowRepImageUploadWarning: true,
    reputationToPostImages: null,
    bindNavPrevention: true,
    postfix: "",
    onDemand: true,
    discardSelector: ".discard-answer"
    ,immediatelyShowMarkdownHelp:true
    );



    );








     

    draft saved


    draft discarded


















    StackExchange.ready(
    function ()
    StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2funix.stackexchange.com%2fquestions%2f454591%2fdnschef-fail-to-open-log-file%23new-answer', 'question_page');

    );

    Post as a guest






























    1 Answer
    1






    active

    oldest

    votes








    1 Answer
    1






    active

    oldest

    votes









    active

    oldest

    votes






    active

    oldest

    votes








    up vote
    1
    down vote













    Take a look at this tutorial. It shows you the various ways you can use dnschef.




    DNSChef is capable of storing activity log in an external file using the --logfile log1.txt command line parameter. Below is a snippet of a sample DNSChef session:




    So something like this:



    $ dnschef -i wlan0 --logfile /tmp/dnschef.log


    The full usage



    root@kali:~# dnschef -h
    Usage: dnschef.py [options]:
    _ _ __
    | | version 0.1 | | / _|
    __| |_ __ ___ ___| |__ ___| |_
    / _` | '_ / __|/ __| '_ / _ _|
    | (_| | | | __ (__| | | | __/ |
    __,_|_| |_|___/___|_| |_|___|_|
    iphelix@thesprawl.org


    DNSChef is a highly configurable DNS Proxy for Penetration Testers and Malware
    Analysts. It is capable of fine configuration of which DNS replies to modify
    or to simply proxy with real responses. In order to take advantage of the tool
    you must either manually configure or poison DNS server entry to point to
    DNSChef. The tool requires root privileges to run.

    Options:
    -h, --help show this help message and exit
    --fakeip=192.168.1.100
    IP address to use for matching DNS queries. If you use
    this parameter without specifying domain names, then
    all queries will be spoofed. Consider using --file
    argument if you need to define more than one IP
    address.
    --fakedomains=thesprawl.org,google.com
    A comma separated list of domain names which will be
    resolved to a FAKE value specified in the --ip
    parameter. All other domain names will be resolved to
    their true values.
    --truedomains=thesprawl.org,google.com
    A comma separated list of domain names which will be
    resolved to their TRUE values. All other domain names
    will be resolved to a fake value specified in the --ip
    parameter.
    --nameservers=4.2.2.1,4.2.2.2
    A comma separated list of alternative DNS servers to
    use with proxied requests. A randomly selected server
    from the list will be used for proxy requests. By
    default, the tool uses Google's public DNS server
    8.8.8.8.
    --file=FILE Specify a file containing a list of DOMAIN=IP pairs
    (one pair per line) used for DNS responses. For
    example: google.com=1.1.1.1 will force all queries to
    'google.com' to be resolved to '1.1.1.1'. You can be
    even more specific by combining --file with other
    arguments. However, data obtained from the file will
    take precedence over others.
    --interface=0.0.0.0 Define an interface to use for the DNS listener. For
    example, use 127.0.0.1 to listen for only requests
    coming from a loopback device.
    --tcp Use TCP DNS proxy instead of the default UDP.
    -q, --quiet Don't show headers.


    Issue #10 - cannot open logfile



    Your issue looks like it's actually a false positive though. The real error is this:




    IOError code 13 (permission denied) is thrown on an attempt to bind to the default port 53 which requires the root permissions




    I found that here in the upstream repo for dnschef - https://github.com/iphelix/dnschef/issues/10.



    In the comments people are stating that this issue is still not resolved, and even when running dnschef as root, it's still reporting the error.



    Bottom line



    Sounds like a bug in dnschef.



    References



    • https://tools.kali.org/sniffingspoofing/dnschef

    • https://github.com/iphelix/dnschef





    share|improve this answer



























      up vote
      1
      down vote













      Take a look at this tutorial. It shows you the various ways you can use dnschef.




      DNSChef is capable of storing activity log in an external file using the --logfile log1.txt command line parameter. Below is a snippet of a sample DNSChef session:




      So something like this:



      $ dnschef -i wlan0 --logfile /tmp/dnschef.log


      The full usage



      root@kali:~# dnschef -h
      Usage: dnschef.py [options]:
      _ _ __
      | | version 0.1 | | / _|
      __| |_ __ ___ ___| |__ ___| |_
      / _` | '_ / __|/ __| '_ / _ _|
      | (_| | | | __ (__| | | | __/ |
      __,_|_| |_|___/___|_| |_|___|_|
      iphelix@thesprawl.org


      DNSChef is a highly configurable DNS Proxy for Penetration Testers and Malware
      Analysts. It is capable of fine configuration of which DNS replies to modify
      or to simply proxy with real responses. In order to take advantage of the tool
      you must either manually configure or poison DNS server entry to point to
      DNSChef. The tool requires root privileges to run.

      Options:
      -h, --help show this help message and exit
      --fakeip=192.168.1.100
      IP address to use for matching DNS queries. If you use
      this parameter without specifying domain names, then
      all queries will be spoofed. Consider using --file
      argument if you need to define more than one IP
      address.
      --fakedomains=thesprawl.org,google.com
      A comma separated list of domain names which will be
      resolved to a FAKE value specified in the --ip
      parameter. All other domain names will be resolved to
      their true values.
      --truedomains=thesprawl.org,google.com
      A comma separated list of domain names which will be
      resolved to their TRUE values. All other domain names
      will be resolved to a fake value specified in the --ip
      parameter.
      --nameservers=4.2.2.1,4.2.2.2
      A comma separated list of alternative DNS servers to
      use with proxied requests. A randomly selected server
      from the list will be used for proxy requests. By
      default, the tool uses Google's public DNS server
      8.8.8.8.
      --file=FILE Specify a file containing a list of DOMAIN=IP pairs
      (one pair per line) used for DNS responses. For
      example: google.com=1.1.1.1 will force all queries to
      'google.com' to be resolved to '1.1.1.1'. You can be
      even more specific by combining --file with other
      arguments. However, data obtained from the file will
      take precedence over others.
      --interface=0.0.0.0 Define an interface to use for the DNS listener. For
      example, use 127.0.0.1 to listen for only requests
      coming from a loopback device.
      --tcp Use TCP DNS proxy instead of the default UDP.
      -q, --quiet Don't show headers.


      Issue #10 - cannot open logfile



      Your issue looks like it's actually a false positive though. The real error is this:




      IOError code 13 (permission denied) is thrown on an attempt to bind to the default port 53 which requires the root permissions




      I found that here in the upstream repo for dnschef - https://github.com/iphelix/dnschef/issues/10.



      In the comments people are stating that this issue is still not resolved, and even when running dnschef as root, it's still reporting the error.



      Bottom line



      Sounds like a bug in dnschef.



      References



      • https://tools.kali.org/sniffingspoofing/dnschef

      • https://github.com/iphelix/dnschef





      share|improve this answer

























        up vote
        1
        down vote










        up vote
        1
        down vote









        Take a look at this tutorial. It shows you the various ways you can use dnschef.




        DNSChef is capable of storing activity log in an external file using the --logfile log1.txt command line parameter. Below is a snippet of a sample DNSChef session:




        So something like this:



        $ dnschef -i wlan0 --logfile /tmp/dnschef.log


        The full usage



        root@kali:~# dnschef -h
        Usage: dnschef.py [options]:
        _ _ __
        | | version 0.1 | | / _|
        __| |_ __ ___ ___| |__ ___| |_
        / _` | '_ / __|/ __| '_ / _ _|
        | (_| | | | __ (__| | | | __/ |
        __,_|_| |_|___/___|_| |_|___|_|
        iphelix@thesprawl.org


        DNSChef is a highly configurable DNS Proxy for Penetration Testers and Malware
        Analysts. It is capable of fine configuration of which DNS replies to modify
        or to simply proxy with real responses. In order to take advantage of the tool
        you must either manually configure or poison DNS server entry to point to
        DNSChef. The tool requires root privileges to run.

        Options:
        -h, --help show this help message and exit
        --fakeip=192.168.1.100
        IP address to use for matching DNS queries. If you use
        this parameter without specifying domain names, then
        all queries will be spoofed. Consider using --file
        argument if you need to define more than one IP
        address.
        --fakedomains=thesprawl.org,google.com
        A comma separated list of domain names which will be
        resolved to a FAKE value specified in the --ip
        parameter. All other domain names will be resolved to
        their true values.
        --truedomains=thesprawl.org,google.com
        A comma separated list of domain names which will be
        resolved to their TRUE values. All other domain names
        will be resolved to a fake value specified in the --ip
        parameter.
        --nameservers=4.2.2.1,4.2.2.2
        A comma separated list of alternative DNS servers to
        use with proxied requests. A randomly selected server
        from the list will be used for proxy requests. By
        default, the tool uses Google's public DNS server
        8.8.8.8.
        --file=FILE Specify a file containing a list of DOMAIN=IP pairs
        (one pair per line) used for DNS responses. For
        example: google.com=1.1.1.1 will force all queries to
        'google.com' to be resolved to '1.1.1.1'. You can be
        even more specific by combining --file with other
        arguments. However, data obtained from the file will
        take precedence over others.
        --interface=0.0.0.0 Define an interface to use for the DNS listener. For
        example, use 127.0.0.1 to listen for only requests
        coming from a loopback device.
        --tcp Use TCP DNS proxy instead of the default UDP.
        -q, --quiet Don't show headers.


        Issue #10 - cannot open logfile



        Your issue looks like it's actually a false positive though. The real error is this:




        IOError code 13 (permission denied) is thrown on an attempt to bind to the default port 53 which requires the root permissions




        I found that here in the upstream repo for dnschef - https://github.com/iphelix/dnschef/issues/10.



        In the comments people are stating that this issue is still not resolved, and even when running dnschef as root, it's still reporting the error.



        Bottom line



        Sounds like a bug in dnschef.



        References



        • https://tools.kali.org/sniffingspoofing/dnschef

        • https://github.com/iphelix/dnschef





        share|improve this answer















        Take a look at this tutorial. It shows you the various ways you can use dnschef.




        DNSChef is capable of storing activity log in an external file using the --logfile log1.txt command line parameter. Below is a snippet of a sample DNSChef session:




        So something like this:



        $ dnschef -i wlan0 --logfile /tmp/dnschef.log


        The full usage



        root@kali:~# dnschef -h
        Usage: dnschef.py [options]:
        _ _ __
        | | version 0.1 | | / _|
        __| |_ __ ___ ___| |__ ___| |_
        / _` | '_ / __|/ __| '_ / _ _|
        | (_| | | | __ (__| | | | __/ |
        __,_|_| |_|___/___|_| |_|___|_|
        iphelix@thesprawl.org


        DNSChef is a highly configurable DNS Proxy for Penetration Testers and Malware
        Analysts. It is capable of fine configuration of which DNS replies to modify
        or to simply proxy with real responses. In order to take advantage of the tool
        you must either manually configure or poison DNS server entry to point to
        DNSChef. The tool requires root privileges to run.

        Options:
        -h, --help show this help message and exit
        --fakeip=192.168.1.100
        IP address to use for matching DNS queries. If you use
        this parameter without specifying domain names, then
        all queries will be spoofed. Consider using --file
        argument if you need to define more than one IP
        address.
        --fakedomains=thesprawl.org,google.com
        A comma separated list of domain names which will be
        resolved to a FAKE value specified in the --ip
        parameter. All other domain names will be resolved to
        their true values.
        --truedomains=thesprawl.org,google.com
        A comma separated list of domain names which will be
        resolved to their TRUE values. All other domain names
        will be resolved to a fake value specified in the --ip
        parameter.
        --nameservers=4.2.2.1,4.2.2.2
        A comma separated list of alternative DNS servers to
        use with proxied requests. A randomly selected server
        from the list will be used for proxy requests. By
        default, the tool uses Google's public DNS server
        8.8.8.8.
        --file=FILE Specify a file containing a list of DOMAIN=IP pairs
        (one pair per line) used for DNS responses. For
        example: google.com=1.1.1.1 will force all queries to
        'google.com' to be resolved to '1.1.1.1'. You can be
        even more specific by combining --file with other
        arguments. However, data obtained from the file will
        take precedence over others.
        --interface=0.0.0.0 Define an interface to use for the DNS listener. For
        example, use 127.0.0.1 to listen for only requests
        coming from a loopback device.
        --tcp Use TCP DNS proxy instead of the default UDP.
        -q, --quiet Don't show headers.


        Issue #10 - cannot open logfile



        Your issue looks like it's actually a false positive though. The real error is this:




        IOError code 13 (permission denied) is thrown on an attempt to bind to the default port 53 which requires the root permissions




        I found that here in the upstream repo for dnschef - https://github.com/iphelix/dnschef/issues/10.



        In the comments people are stating that this issue is still not resolved, and even when running dnschef as root, it's still reporting the error.



        Bottom line



        Sounds like a bug in dnschef.



        References



        • https://tools.kali.org/sniffingspoofing/dnschef

        • https://github.com/iphelix/dnschef






        share|improve this answer















        share|improve this answer



        share|improve this answer








        edited Jul 11 at 3:19


























        answered Jul 11 at 3:11









        slm♦

        233k65479651




        233k65479651






















             

            draft saved


            draft discarded


























             


            draft saved


            draft discarded














            StackExchange.ready(
            function ()
            StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2funix.stackexchange.com%2fquestions%2f454591%2fdnschef-fail-to-open-log-file%23new-answer', 'question_page');

            );

            Post as a guest













































































            Popular posts from this blog

            How to check contact read email or not when send email to Individual?

            Bahrain

            Postfix configuration issue with fips on centos 7; mailgun relay