[Bro] How can I extract the DNS query
qhu009 at aucklanduni.ac.nz
Fri Jan 23 16:46:16 PST 2015
I am a new Bro user. Recently, I observer a new way to launch a IPv6
address scanning. For instance, a attacker sends a IPv6 reverse DNS lookup
query to a target DNS server and extracts a IPv6 record from the reverse
The DNS query looks like:
I try to use Bro to detect this kinds of attack. But when I use main.bro to
read my trace file, I can't extract the DNS query? I looked the dns_request
event and added some debug messages in this routine. Again, I can't see
the ip6.arpa query print out.
To detect this attack, I have to extract the DNS query and compare with the
previous query. Is that possible to extract the DNS query by using some
existing functions? Do you have any suggestion?
Many thanks for your attention to this matter. Have a nice day.
-------------- next part --------------
An HTML attachment was scrubbed...
More information about the Bro