Network Vulnerability Scanning

Nessus

docker run --name "nessus" -d -p 8834:8834 tenableofficial/nessus

Update

sudo docker exec -it [container_id_or_name] sudo /opt/nessus/sbin/nessuscli update

DNS Amplification

A DNS amplification attack is a popular form of DDoS that relies on the use of publicly accessible Open DNS resolvers — DNS resolvers are DNS servers that can serve to anyone’s DNS request for e.g. Google’s DNS server 8.8.8.8 is one of the publicly available DNS resolvers that translates domain name to an IP address — to overwhelm a victim system with DNS response traffic. Launching a DNS amplification attack isn’t that difficult, as it relies on UDP, which doesn’t have handshake mechanism like TCP, so the source IP verification step is skipped, and the reason it’s called an amplification attack is because the attacker only needs a small fraction of bandwidth to choke the bandwidth of the victim.

Nmap

 nmap -sU -p53 --script=dns-recursion -iL <DOMAIN_LIST> -oA dns-recursion -v2 -Pn

Clone the repository

Create a Virtual Environment

Install Dependancies

Run the Script

Example

Last updated