项目作者: Nick-Triller

项目描述 :
DNS amplification PoC
高级语言: Go
项目地址: git://github.com/Nick-Triller/damplify.git
创建时间: 2020-08-07T20:22:42Z
项目社区:https://github.com/Nick-Triller/damplify

开源协议:

下载


Damplify

Damplify is a DNS amplification attack tool implemented in Go.
It was created for educational purposes.
Please don’t misuse it for illegal activities.

Damplify works on Linux only.

Background

DNS amplification attacks are a form of reflective DDOS.
The attacker sends DNS queries with spoofed source IP to recursive resolvers.
The resolvers send their answers to the spoofed source IP.

As the responses from the recursive resolvers can be many times bigger than the query, the traffic
is amplified.
Furthermore, blocking the traffic is hindered as it originates from a large number of legitimate systems.

Installation

Build damplify with the following command (requires go):

  1. go install github.com/nick-triller/damplify

Usage

  1. A DNS ampflification attack tool
  2. Usage:
  3. damplify <targetIP> <targetPort> [flags]
  4. Flags:
  5. -h, --help help for damplify
  6. --resolversPath string Path to file containing resolver IPs (default "resolvers.txt")
  7. --workers int Number of worker routines (default 10)

Example invocation:

  1. damplify --resolversPath resolvers.txt 192.168.178.40 9998

Limitations

As this is a proof of concept, there are some limitations:

  • The DNS query is hardcoded (TXT query for cloudflare.com, amplification ~x10).
  • The tool runs on linux only. Golang doesn’t implement raw sockets on Windows.
  • Resolvers and target IPs must be IPv4.

Attributions

The logo was created by Freepik.

The included DNS resolver list resolvers.txt was taken
from public-dns.info.