1. Change to udp-dns attack folder - `cd other-end-attack/dnuss/full_scan`
1. Change to udp-dns attack folder - `cd server-side-attack/dns-sside/full_scan`
2. Compile attack script - `make`
3. Check to make sure vpn server has a conntrack entry for some vpn client's dns lookup (on vpn-server vm): `sudo conntrack -L | grep udp`
3. Try to inject from attack router - `sudo ./uud_send <dns_server_ip> <src_port (53)> <vpn_server_ip> <start_port> <end_port>`
@ -34,8 +34,7 @@
* VPN client connected to a VPN server
* Reverse path filtering disabled on the VPN client machine
* Attack router acting as the local network gateway for the victim (VPN client) machine
* Attack machine acting as the local network gateway for the victim (VPN client) machine using hostapd, create_ap, or Ubuntu's built-in hotspot feature.