Pentest & Bug Bounty Resources and Techniques
  • Pentest & Bug Bounty Resources and Techniques
    • Introduction
    • Tests Checklist
    • OSINT
    • Communications Security
      • SSL/TLS
    • Networking
      • Subdomains Discovery
        • DNS & OSINT
        • DNS Brute force
          • Second DNS Brute-Force Round
      • Subdomain Takeover
      • Network Host Scan/Discovery
        • External/Internal
        • Internal only
      • Network Vulnerability Scanning
      • Network Hacking
      • Parsing
      • Reporting
    • Brute Force
      • Wordlists
      • Databases
      • SSH
    • Web
      • Endpoint Discovery
      • Infrastructure & Configuration
        • Headers
        • WAF Detection/ Evasion
      • Injection
        • GraphQL
        • Cross-Site Scripting (XSS)
        • SQL Injection
        • Payloads
      • SSRF & XXE
        • Labs & Resources
        • Tools
        • SVG SSRF Cheatsheet
        • XXE - XEE - XML External Entity
      • JWT Vulnerabilities (Json Web Tokens)
      • HTTP/S DoS
    • Mobile
      • Both
        • SAST
          • MobSF
        • DAST
          • Installing Frida and Objection
      • Android
        • Create a Lab
          • Rooting Android Emulator
          • Rooting Android Emulator Cheat Sheet
        • APK Certificates
        • SAST
          • APKs
            • Get Information from APK
            • GDA (GJoy Dex Analysizer)
            • Scanning APK for URIs, endpoints & secrets
            • Google Maps API Scanner
        • DAST
          • Rooting the Android Studio AVDs
          • non-Rooted devices
            • Bypass SSL Pinning - non-rooted devices
              • Method 1: apk-mitm
              • Instrumentation with Frida and Objection
                • Bypass SSL Pinning - Method 2: With Objection Explore
                • Bypass SSL Pinning - Method 3: With root_bypass.js
          • Rooted Devices
            • Run frida-server in the emulator or device
            • Inject Frida
            • Bypass SSL Pinning - rooted devices
              • Install Burp CA as a system-level CA on the device
      • iOS
        • SAST
          • Building a reverse iOS engineering environment for free
          • Test Vulnerabilities
  • Lets Practice
    • Virtual Machines
    • Vulnerable App
    • Guided Labs
    • CTFs
  • Group 1
    • AI
Powered by GitBook
On this page
  • Nessus
  • Deploy Nessus as a Docker Image
  • Update
  • DNS Amplification
  • Nmap
  • dns_amplification_scanner
  1. Pentest & Bug Bounty Resources and Techniques
  2. Networking

Network Vulnerability Scanning

PreviousInternal onlyNextNetwork Hacking

Last updated 8 months ago

Nessus

docker run --name "nessus" -d -p 8834:8834 tenableofficial/nessus

Ask for an activation code:

Update

sudo docker exec -it [container_id_or_name] sudo /opt/nessus/sbin/nessuscli update

DNS Amplification

A DNS amplification attack is a popular form of DDoS that relies on the use of publicly accessible Open DNS resolvers — DNS resolvers are DNS servers that can serve to anyone’s DNS request for e.g. Google’s DNS server 8.8.8.8 is one of the publicly available DNS resolvers that translates domain name to an IP address — to overwhelm a victim system with DNS response traffic. Launching a DNS amplification attack isn’t that difficult, as it relies on UDP, which doesn’t have handshake mechanism like TCP, so the source IP verification step is skipped, and the reason it’s called an amplification attack is because the attacker only needs a small fraction of bandwidth to choke the bandwidth of the victim.

Interesting articles:

Nmap

 nmap -sU -p53 --script=dns-recursion -iL <DOMAIN_LIST> -oA dns-recursion -v2 -Pn

Clone the repository

git clone https://github.com/pcastagnaro/dns_amplification_scanner/
cd dns_amplification_scanner

Create a Virtual Environment

python3 -m venv myenv; source myenv/bin/activate

Install Dependancies

pip install colorama

Run the Script

python dns_amplification_scanner.py <DNS> --domains <DOMAIN_LIST> --type ANY 

Example

python dns_amplification_scanner.py 8.8.8.8 --domains domains.txt --type ANY 

Deploy Nessus as a Docker Image
https://es-la.tenable.com/products/nessus/activation-code
https://medium.com/@vasiqmz/dns-amplification-ddos-attack-d4957b45bc66
https://isc.sans.edu/diary/Testing+for+DNS+recursion+and+avoiding+being+part+of+DNS+amplification+attacks/20567
dns_amplification_scanner