Network Vulnerability Scanning
Nessus
docker run --name "nessus" -d -p 8834:8834 tenableofficial/nessus
Update
sudo docker exec -it [container_id_or_name] sudo /opt/nessus/sbin/nessuscli update
DNS Amplification
A DNS amplification attack is a popular form of DDoS that relies on the use of publicly accessible Open DNS resolvers — DNS resolvers are DNS servers that can serve to anyone’s DNS request for e.g. Google’s DNS server 8.8.8.8 is one of the publicly available DNS resolvers that translates domain name to an IP address — to overwhelm a victim system with DNS response traffic. Launching a DNS amplification attack isn’t that difficult, as it relies on UDP, which doesn’t have handshake mechanism like TCP, so the source IP verification step is skipped, and the reason it’s called an amplification attack is because the attacker only needs a small fraction of bandwidth to choke the bandwidth of the victim.
Nmap
nmap -sU -p53 --script=dns-recursion -iL <DOMAIN_LIST> -oA dns-recursion -v2 -Pn

Clone the repository
git clone https://github.com/pcastagnaro/dns_amplification_scanner/
cd dns_amplification_scanner
Create a Virtual Environment
python3 -m venv myenv; source myenv/bin/activate
Install Dependancies
pip install colorama
Run the Script
python dns_amplification_scanner.py <DNS> --domains <DOMAIN_LIST> --type ANY
Example
python dns_amplification_scanner.py 8.8.8.8 --domains domains.txt --type ANY
Last updated