Skip to content

This script checks if each domain from a given domain list is vulnerable to CVE-2006-0987

Notifications You must be signed in to change notification settings

pcastagnaro/dns_amplification_scanner

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

7 Commits
 
 
 
 

Repository files navigation

DNS Amplification DDoS Detection and Verification Tool

This script is designed to identify and verify potential DNS servers vulnerable to exploitation in DNS amplification distributed denial-of-service (DDoS) attacks. It addresses the limitations of automated vulnerability scanners like Nessus, which may generate false positives when detecting this issue using plugin 35450.

Background

DNS amplification attacks are a type of reflection-based DDoS attack that exploits misconfigured or open DNS resolvers. Attackers send small DNS queries with spoofed source IP addresses, causing the DNS server to send large responses to the victim's IP address. This amplifies the attack traffic, potentially overwhelming the target's network resources.

Functionality

The script performs the following key functions:

  1. Bulk domain processing: Analyzes multiple domains efficiently to identify potential vulnerabilities.
  2. DNS query simulation: Sends specially crafted DNS queries to test for amplification behavior.
  3. Response analysis: Examines DNS responses to determine if the server exhibits characteristics conducive to amplification attacks.
  4. False positive reduction: Implements additional checks to minimize false positives compared to basic vulnerability scans.

Use Case

This tool is particularly useful for:

  • Security professionals conducting large-scale DNS infrastructure audits
  • Network administrators verifying the security posture of their DNS servers
  • Researchers studying DNS amplification attack vectors

By providing a more accurate assessment of DNS amplification vulnerabilities, this script enables organizations to prioritize mitigation efforts and enhance their DDoS resilience.


Usage

Clone the repository

git clone https://github.com/pcastagnaro/dns_amplification_scanner/
cd dns_amplification_scanner

Create a Virtual Environment

python3 -m venv myenv; source myenv/bin/activate

Install Dependancies

pip install colorama

Run the Script

python dns_amplification_scanner.py <DNS> --domains <DOMAIN_LIST> --type ANY 

Example

python dns_amplification_scanner.py 8.8.8.8 --domains domains.txt --type ANY 

Amplification

About

This script checks if each domain from a given domain list is vulnerable to CVE-2006-0987

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages