Source: rebind
Section: utils
Priority: extra
Maintainer: Devon Kearns <dookie@kali.org>
Build-Depends: debhelper (>= 8.0.0), python-dev
Standards-Version: 3.9.3
Homepage: https://code.google.com/p/rebind/
Vcs-Git: git://git.kali.org/packages/rebind.git
Vcs-Browser: http://git.kali.org/gitweb/?p=packages/rebind.git;a=summary

Package: rebind
Architecture: any
Depends: ${shlibs:Depends}, ${misc:Depends}
Breaks: kali-menu (<< 2016.3.0)
Description: DNS rebinding tool
 Rebind is a tool that implements the multiple A record DNS 
 rebinding attack. Although this tool was originally written 
 to target home routers, it can be used to target any public 
 (non RFC1918) IP address.
 .
 Rebind provides an external attacker access to a target 
 router's internal Web interface. This tool works on routers 
 that implement the weak end system model in their IP stack, 
 have specifically configured firewall rules, and who bind 
 their Web service to the router's WAN interface. Note that 
 remote administration does not need to be enabled for this 
 attack to work. All that is required is that a user inside 
 the target network surf to a Web site that is controlled, 
 or has been compromised, by the attacker.
