Dnschef: Fail to open log file?
Clash Royale CLAN TAG#URR8PPP
up vote
0
down vote
favorite
I'm usin dnschef
in my Linux machine, but it gave me this error.
How to fix this issue?
    Â
Plus, I can use dnschef
(which will use localhost network card lo by default) and it doesn't have such issue.
networking kali-linux dns
add a comment |Â
up vote
0
down vote
favorite
I'm usin dnschef
in my Linux machine, but it gave me this error.
How to fix this issue?
    Â
Plus, I can use dnschef
(which will use localhost network card lo by default) and it doesn't have such issue.
networking kali-linux dns
you havenâÂÂt provided the âÂÂlogfile parameter, but it appears there are several issues with the softwareâÂÂs error reporting.
â Jeff Schaller
Jul 11 at 1:40
add a comment |Â
up vote
0
down vote
favorite
up vote
0
down vote
favorite
I'm usin dnschef
in my Linux machine, but it gave me this error.
How to fix this issue?
    Â
Plus, I can use dnschef
(which will use localhost network card lo by default) and it doesn't have such issue.
networking kali-linux dns
I'm usin dnschef
in my Linux machine, but it gave me this error.
How to fix this issue?
    Â
Plus, I can use dnschef
(which will use localhost network card lo by default) and it doesn't have such issue.
networking kali-linux dns
edited Jul 11 at 3:08
slmâ¦
233k65479651
233k65479651
asked Jul 11 at 1:21
Albert Zhang
172
172
you havenâÂÂt provided the âÂÂlogfile parameter, but it appears there are several issues with the softwareâÂÂs error reporting.
â Jeff Schaller
Jul 11 at 1:40
add a comment |Â
you havenâÂÂt provided the âÂÂlogfile parameter, but it appears there are several issues with the softwareâÂÂs error reporting.
â Jeff Schaller
Jul 11 at 1:40
you havenâÂÂt provided the âÂÂlogfile parameter, but it appears there are several issues with the softwareâÂÂs error reporting.
â Jeff Schaller
Jul 11 at 1:40
you havenâÂÂt provided the âÂÂlogfile parameter, but it appears there are several issues with the softwareâÂÂs error reporting.
â Jeff Schaller
Jul 11 at 1:40
add a comment |Â
1 Answer
1
active
oldest
votes
up vote
1
down vote
Take a look at this tutorial. It shows you the various ways you can use dnschef
.
DNSChef is capable of storing activity log in an external file using the
--logfile log1.txt
command line parameter. Below is a snippet of a sample DNSChef session:
So something like this:
$ dnschef -i wlan0 --logfile /tmp/dnschef.log
The full usage
root@kali:~# dnschef -h
Usage: dnschef.py [options]:
_ _ __
| | version 0.1 | | / _|
__| |_ __ ___ ___| |__ ___| |_
/ _` | '_ / __|/ __| '_ / _ _|
| (_| | | | __ (__| | | | __/ |
__,_|_| |_|___/___|_| |_|___|_|
iphelix@thesprawl.org
DNSChef is a highly configurable DNS Proxy for Penetration Testers and Malware
Analysts. It is capable of fine configuration of which DNS replies to modify
or to simply proxy with real responses. In order to take advantage of the tool
you must either manually configure or poison DNS server entry to point to
DNSChef. The tool requires root privileges to run.
Options:
-h, --help show this help message and exit
--fakeip=192.168.1.100
IP address to use for matching DNS queries. If you use
this parameter without specifying domain names, then
all queries will be spoofed. Consider using --file
argument if you need to define more than one IP
address.
--fakedomains=thesprawl.org,google.com
A comma separated list of domain names which will be
resolved to a FAKE value specified in the --ip
parameter. All other domain names will be resolved to
their true values.
--truedomains=thesprawl.org,google.com
A comma separated list of domain names which will be
resolved to their TRUE values. All other domain names
will be resolved to a fake value specified in the --ip
parameter.
--nameservers=4.2.2.1,4.2.2.2
A comma separated list of alternative DNS servers to
use with proxied requests. A randomly selected server
from the list will be used for proxy requests. By
default, the tool uses Google's public DNS server
8.8.8.8.
--file=FILE Specify a file containing a list of DOMAIN=IP pairs
(one pair per line) used for DNS responses. For
example: google.com=1.1.1.1 will force all queries to
'google.com' to be resolved to '1.1.1.1'. You can be
even more specific by combining --file with other
arguments. However, data obtained from the file will
take precedence over others.
--interface=0.0.0.0 Define an interface to use for the DNS listener. For
example, use 127.0.0.1 to listen for only requests
coming from a loopback device.
--tcp Use TCP DNS proxy instead of the default UDP.
-q, --quiet Don't show headers.
Issue #10 - cannot open logfile
Your issue looks like it's actually a false positive though. The real error is this:
IOError code 13 (permission denied) is thrown on an attempt to bind to the default port 53 which requires the root permissions
I found that here in the upstream repo for dnschef
- https://github.com/iphelix/dnschef/issues/10.
In the comments people are stating that this issue is still not resolved, and even when running dnschef
as root, it's still reporting the error.
Bottom line
Sounds like a bug in dnschef
.
References
- https://tools.kali.org/sniffingspoofing/dnschef
- https://github.com/iphelix/dnschef
add a comment |Â
1 Answer
1
active
oldest
votes
1 Answer
1
active
oldest
votes
active
oldest
votes
active
oldest
votes
up vote
1
down vote
Take a look at this tutorial. It shows you the various ways you can use dnschef
.
DNSChef is capable of storing activity log in an external file using the
--logfile log1.txt
command line parameter. Below is a snippet of a sample DNSChef session:
So something like this:
$ dnschef -i wlan0 --logfile /tmp/dnschef.log
The full usage
root@kali:~# dnschef -h
Usage: dnschef.py [options]:
_ _ __
| | version 0.1 | | / _|
__| |_ __ ___ ___| |__ ___| |_
/ _` | '_ / __|/ __| '_ / _ _|
| (_| | | | __ (__| | | | __/ |
__,_|_| |_|___/___|_| |_|___|_|
iphelix@thesprawl.org
DNSChef is a highly configurable DNS Proxy for Penetration Testers and Malware
Analysts. It is capable of fine configuration of which DNS replies to modify
or to simply proxy with real responses. In order to take advantage of the tool
you must either manually configure or poison DNS server entry to point to
DNSChef. The tool requires root privileges to run.
Options:
-h, --help show this help message and exit
--fakeip=192.168.1.100
IP address to use for matching DNS queries. If you use
this parameter without specifying domain names, then
all queries will be spoofed. Consider using --file
argument if you need to define more than one IP
address.
--fakedomains=thesprawl.org,google.com
A comma separated list of domain names which will be
resolved to a FAKE value specified in the --ip
parameter. All other domain names will be resolved to
their true values.
--truedomains=thesprawl.org,google.com
A comma separated list of domain names which will be
resolved to their TRUE values. All other domain names
will be resolved to a fake value specified in the --ip
parameter.
--nameservers=4.2.2.1,4.2.2.2
A comma separated list of alternative DNS servers to
use with proxied requests. A randomly selected server
from the list will be used for proxy requests. By
default, the tool uses Google's public DNS server
8.8.8.8.
--file=FILE Specify a file containing a list of DOMAIN=IP pairs
(one pair per line) used for DNS responses. For
example: google.com=1.1.1.1 will force all queries to
'google.com' to be resolved to '1.1.1.1'. You can be
even more specific by combining --file with other
arguments. However, data obtained from the file will
take precedence over others.
--interface=0.0.0.0 Define an interface to use for the DNS listener. For
example, use 127.0.0.1 to listen for only requests
coming from a loopback device.
--tcp Use TCP DNS proxy instead of the default UDP.
-q, --quiet Don't show headers.
Issue #10 - cannot open logfile
Your issue looks like it's actually a false positive though. The real error is this:
IOError code 13 (permission denied) is thrown on an attempt to bind to the default port 53 which requires the root permissions
I found that here in the upstream repo for dnschef
- https://github.com/iphelix/dnschef/issues/10.
In the comments people are stating that this issue is still not resolved, and even when running dnschef
as root, it's still reporting the error.
Bottom line
Sounds like a bug in dnschef
.
References
- https://tools.kali.org/sniffingspoofing/dnschef
- https://github.com/iphelix/dnschef
add a comment |Â
up vote
1
down vote
Take a look at this tutorial. It shows you the various ways you can use dnschef
.
DNSChef is capable of storing activity log in an external file using the
--logfile log1.txt
command line parameter. Below is a snippet of a sample DNSChef session:
So something like this:
$ dnschef -i wlan0 --logfile /tmp/dnschef.log
The full usage
root@kali:~# dnschef -h
Usage: dnschef.py [options]:
_ _ __
| | version 0.1 | | / _|
__| |_ __ ___ ___| |__ ___| |_
/ _` | '_ / __|/ __| '_ / _ _|
| (_| | | | __ (__| | | | __/ |
__,_|_| |_|___/___|_| |_|___|_|
iphelix@thesprawl.org
DNSChef is a highly configurable DNS Proxy for Penetration Testers and Malware
Analysts. It is capable of fine configuration of which DNS replies to modify
or to simply proxy with real responses. In order to take advantage of the tool
you must either manually configure or poison DNS server entry to point to
DNSChef. The tool requires root privileges to run.
Options:
-h, --help show this help message and exit
--fakeip=192.168.1.100
IP address to use for matching DNS queries. If you use
this parameter without specifying domain names, then
all queries will be spoofed. Consider using --file
argument if you need to define more than one IP
address.
--fakedomains=thesprawl.org,google.com
A comma separated list of domain names which will be
resolved to a FAKE value specified in the --ip
parameter. All other domain names will be resolved to
their true values.
--truedomains=thesprawl.org,google.com
A comma separated list of domain names which will be
resolved to their TRUE values. All other domain names
will be resolved to a fake value specified in the --ip
parameter.
--nameservers=4.2.2.1,4.2.2.2
A comma separated list of alternative DNS servers to
use with proxied requests. A randomly selected server
from the list will be used for proxy requests. By
default, the tool uses Google's public DNS server
8.8.8.8.
--file=FILE Specify a file containing a list of DOMAIN=IP pairs
(one pair per line) used for DNS responses. For
example: google.com=1.1.1.1 will force all queries to
'google.com' to be resolved to '1.1.1.1'. You can be
even more specific by combining --file with other
arguments. However, data obtained from the file will
take precedence over others.
--interface=0.0.0.0 Define an interface to use for the DNS listener. For
example, use 127.0.0.1 to listen for only requests
coming from a loopback device.
--tcp Use TCP DNS proxy instead of the default UDP.
-q, --quiet Don't show headers.
Issue #10 - cannot open logfile
Your issue looks like it's actually a false positive though. The real error is this:
IOError code 13 (permission denied) is thrown on an attempt to bind to the default port 53 which requires the root permissions
I found that here in the upstream repo for dnschef
- https://github.com/iphelix/dnschef/issues/10.
In the comments people are stating that this issue is still not resolved, and even when running dnschef
as root, it's still reporting the error.
Bottom line
Sounds like a bug in dnschef
.
References
- https://tools.kali.org/sniffingspoofing/dnschef
- https://github.com/iphelix/dnschef
add a comment |Â
up vote
1
down vote
up vote
1
down vote
Take a look at this tutorial. It shows you the various ways you can use dnschef
.
DNSChef is capable of storing activity log in an external file using the
--logfile log1.txt
command line parameter. Below is a snippet of a sample DNSChef session:
So something like this:
$ dnschef -i wlan0 --logfile /tmp/dnschef.log
The full usage
root@kali:~# dnschef -h
Usage: dnschef.py [options]:
_ _ __
| | version 0.1 | | / _|
__| |_ __ ___ ___| |__ ___| |_
/ _` | '_ / __|/ __| '_ / _ _|
| (_| | | | __ (__| | | | __/ |
__,_|_| |_|___/___|_| |_|___|_|
iphelix@thesprawl.org
DNSChef is a highly configurable DNS Proxy for Penetration Testers and Malware
Analysts. It is capable of fine configuration of which DNS replies to modify
or to simply proxy with real responses. In order to take advantage of the tool
you must either manually configure or poison DNS server entry to point to
DNSChef. The tool requires root privileges to run.
Options:
-h, --help show this help message and exit
--fakeip=192.168.1.100
IP address to use for matching DNS queries. If you use
this parameter without specifying domain names, then
all queries will be spoofed. Consider using --file
argument if you need to define more than one IP
address.
--fakedomains=thesprawl.org,google.com
A comma separated list of domain names which will be
resolved to a FAKE value specified in the --ip
parameter. All other domain names will be resolved to
their true values.
--truedomains=thesprawl.org,google.com
A comma separated list of domain names which will be
resolved to their TRUE values. All other domain names
will be resolved to a fake value specified in the --ip
parameter.
--nameservers=4.2.2.1,4.2.2.2
A comma separated list of alternative DNS servers to
use with proxied requests. A randomly selected server
from the list will be used for proxy requests. By
default, the tool uses Google's public DNS server
8.8.8.8.
--file=FILE Specify a file containing a list of DOMAIN=IP pairs
(one pair per line) used for DNS responses. For
example: google.com=1.1.1.1 will force all queries to
'google.com' to be resolved to '1.1.1.1'. You can be
even more specific by combining --file with other
arguments. However, data obtained from the file will
take precedence over others.
--interface=0.0.0.0 Define an interface to use for the DNS listener. For
example, use 127.0.0.1 to listen for only requests
coming from a loopback device.
--tcp Use TCP DNS proxy instead of the default UDP.
-q, --quiet Don't show headers.
Issue #10 - cannot open logfile
Your issue looks like it's actually a false positive though. The real error is this:
IOError code 13 (permission denied) is thrown on an attempt to bind to the default port 53 which requires the root permissions
I found that here in the upstream repo for dnschef
- https://github.com/iphelix/dnschef/issues/10.
In the comments people are stating that this issue is still not resolved, and even when running dnschef
as root, it's still reporting the error.
Bottom line
Sounds like a bug in dnschef
.
References
- https://tools.kali.org/sniffingspoofing/dnschef
- https://github.com/iphelix/dnschef
Take a look at this tutorial. It shows you the various ways you can use dnschef
.
DNSChef is capable of storing activity log in an external file using the
--logfile log1.txt
command line parameter. Below is a snippet of a sample DNSChef session:
So something like this:
$ dnschef -i wlan0 --logfile /tmp/dnschef.log
The full usage
root@kali:~# dnschef -h
Usage: dnschef.py [options]:
_ _ __
| | version 0.1 | | / _|
__| |_ __ ___ ___| |__ ___| |_
/ _` | '_ / __|/ __| '_ / _ _|
| (_| | | | __ (__| | | | __/ |
__,_|_| |_|___/___|_| |_|___|_|
iphelix@thesprawl.org
DNSChef is a highly configurable DNS Proxy for Penetration Testers and Malware
Analysts. It is capable of fine configuration of which DNS replies to modify
or to simply proxy with real responses. In order to take advantage of the tool
you must either manually configure or poison DNS server entry to point to
DNSChef. The tool requires root privileges to run.
Options:
-h, --help show this help message and exit
--fakeip=192.168.1.100
IP address to use for matching DNS queries. If you use
this parameter without specifying domain names, then
all queries will be spoofed. Consider using --file
argument if you need to define more than one IP
address.
--fakedomains=thesprawl.org,google.com
A comma separated list of domain names which will be
resolved to a FAKE value specified in the --ip
parameter. All other domain names will be resolved to
their true values.
--truedomains=thesprawl.org,google.com
A comma separated list of domain names which will be
resolved to their TRUE values. All other domain names
will be resolved to a fake value specified in the --ip
parameter.
--nameservers=4.2.2.1,4.2.2.2
A comma separated list of alternative DNS servers to
use with proxied requests. A randomly selected server
from the list will be used for proxy requests. By
default, the tool uses Google's public DNS server
8.8.8.8.
--file=FILE Specify a file containing a list of DOMAIN=IP pairs
(one pair per line) used for DNS responses. For
example: google.com=1.1.1.1 will force all queries to
'google.com' to be resolved to '1.1.1.1'. You can be
even more specific by combining --file with other
arguments. However, data obtained from the file will
take precedence over others.
--interface=0.0.0.0 Define an interface to use for the DNS listener. For
example, use 127.0.0.1 to listen for only requests
coming from a loopback device.
--tcp Use TCP DNS proxy instead of the default UDP.
-q, --quiet Don't show headers.
Issue #10 - cannot open logfile
Your issue looks like it's actually a false positive though. The real error is this:
IOError code 13 (permission denied) is thrown on an attempt to bind to the default port 53 which requires the root permissions
I found that here in the upstream repo for dnschef
- https://github.com/iphelix/dnschef/issues/10.
In the comments people are stating that this issue is still not resolved, and even when running dnschef
as root, it's still reporting the error.
Bottom line
Sounds like a bug in dnschef
.
References
- https://tools.kali.org/sniffingspoofing/dnschef
- https://github.com/iphelix/dnschef
edited Jul 11 at 3:19
answered Jul 11 at 3:11
slmâ¦
233k65479651
233k65479651
add a comment |Â
add a comment |Â
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2funix.stackexchange.com%2fquestions%2f454591%2fdnschef-fail-to-open-log-file%23new-answer', 'question_page');
);
Post as a guest
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
you havenâÂÂt provided the âÂÂlogfile parameter, but it appears there are several issues with the softwareâÂÂs error reporting.
â Jeff Schaller
Jul 11 at 1:40