Skip to content

Commit c3e2998

Browse files
authored
Merge pull request #1827 from HackTricks-wiki/research_update_src_network-services-pentesting_5353-udp-multicast-dns-mdns_20260129_162240
Research Update Enhanced src/network-services-pentesting/535...
2 parents 879ef27 + c2e7e68 commit c3e2998

2 files changed

Lines changed: 18 additions & 2 deletions

File tree

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,4 @@
1+
# Linux Basics
2+
3+
{{#include ../banners/hacktricks-training.md}}
4+

src/network-services-pentesting/5353-udp-multicast-dns-mdns.md

Lines changed: 14 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -83,6 +83,8 @@ sudo bettercap -iface <iface> -eval "zerogod.discovery on"
8383

8484
# Show all services seen from a host
8585
> zerogod.show 192.168.1.42
86+
# Show full DNS records for a host (newer bettercap)
87+
> zerogod.show-full 192.168.1.42
8688

8789
# Impersonate all services of a target host automatically
8890
> zerogod.impersonate 192.168.1.42
@@ -105,7 +107,15 @@ Also see generic LLMNR/NBNS/mDNS/WPAD spoofing and credential capture/relay work
105107
### Notes on recent implementation issues (useful for DoS/persistence during engagements)
106108

107109
- Avahi reachable-assertion and D-Bus crash bugs (2023) can terminate avahi-daemon on Linux distributions (e.g. CVE-2023-38469..38473, CVE-2023-1981), disrupting service discovery on target hosts until restart.
108-
- Cisco IOS XE Wireless LAN Controller mDNS gateway DoS (2024, CVE-2024-20303) allows adjacent attackers to drive high CPU and disconnect APs. If you encounter an mDNS gateway between VLANs, be aware of its stability under malformed or high-rate mDNS.
110+
- Cisco IOS XE Wireless LAN Controller mDNS gateway DoS (CVE-2024-20303) lets adjacent WLAN clients flood crafted mDNS, spiking WLC CPU and dropping AP tunnels—handy if you need to force client roaming or controller resets during an engagement.
111+
- Apple mDNSResponder logic error DoS (CVE-2024-44183) lets a sandboxed local process crash Bonjour to briefly suppress service publication/lookup on Apple endpoints; patched in current iOS/macOS releases.
112+
- Apple mDNSResponder correctness issue (CVE-2025-31222) allowed local privilege escalation via mDNSResponder; useful for persistence on unmanaged Macs/iPhones, fixed in recent iOS/macOS updates.
113+
114+
### Browser/WebRTC mDNS considerations
115+
116+
Modern Chromium/Firefox obfuscate host candidates with random mDNS names. You can re-expose LAN IPs on managed endpoints by pushing the Chrome policy `WebRtcLocalIpsAllowedUrls` (or toggling `chrome://flags/#enable-webrtc-hide-local-ips-with-mdns`/Edge equivalent) so ICE exposes host candidates instead of mDNS; set via `HKLM\Software\Policies\Google\Chrome`.
117+
118+
When users disable the protection manually (common in WebRTC troubleshooting guides), their browsers start advertising plain host candidates again, which you can capture via mDNS or ICE signaling to speed up host discovery.
109119

110120
## Defensive considerations and OPSEC
111121

@@ -154,6 +164,8 @@ For more information check:
154164
- [Practical IoT Hacking: The Definitive Guide to Attacking the Internet of Things](https://books.google.co.uk/books/about/Practical_IoT_Hacking.html?id=GbYEEAAAQBAJ&redir_esc=y)
155165
- [Nmap NSE: broadcast-dns-service-discovery](https://nmap.org/nsedoc/scripts/broadcast-dns-service-discovery.html)
156166
- [bettercap zerogod (mDNS/DNS-SD discovery, spoofing, impersonation)](https://www.bettercap.org/modules/ethernet/zerogod/)
167+
- [Cisco IOS XE WLC mDNS gateway DoS (CVE-2024-20303) advisory](https://www.cisco.com/c/en/us/support/docs/csa/cisco-sa-wlc-mdns-dos-4hv6pBGf.html)
168+
- [Rapid7 advisory for Apple mDNSResponder CVE-2024-44183](https://www.rapid7.com/db/vulnerabilities/apple-mdnsresponder-cve-2024-44183/)
169+
- [Rapid7 writeup of Apple mDNSResponder CVE-2025-31222](https://www.rapid7.com/db/vulnerabilities/apple-osx-mdnsresponder-cve-2025-31222/)
157170

158171
{{#include ../banners/hacktricks-training.md}}
159-

0 commit comments

Comments
 (0)