This test opens a VPN connection to the target network and afterwards trys to run an exploit against a DNS server.
It is expected that the target runs Linux Redhat 6.x - named 8.2/8.2.1 (from rpm). Other systems are supported, too, but therefore this test case has to be updated.
1: Linux Redhat 6.x - named 8.2/8.2.1 (from rpm) 2: Linux SolarDiz's non-exec stack patch - named 8.2/8.2.1 3: Solaris 7 (0xff) - named 8.2.1 4: Solaris 2.6 - named 8.2.1 5: FreeBSD 3.2-RELEASE - named 8.2 6: OpenBSD 2.5 - named 8.2 7: NetBSD 1.4.1 - named 8.2.1
Public Member Functions
|This function is called by the __init__ function from the parent. |
|implementation of DNS hijinks |