A domain-name dystem (DNS) amplification attack exploits open DNS resolvers by performing a spoofed query of all record types for a given domain. The effectiveness of this attack can be increased by employing a DDoS component as well by sending requests to multiple open resolvers simultaneously.
DNS amplification DoS attacks
Getting ready
To simulate a DNS amplification attack, you will need to either have a local nameserver or know the IP address of an open and publicly accessible nameserver. In the examples provided, an installation of Ubuntu is used as a scan target. For more information on setting up Ubuntu, refer to the Installing Windows Server recipe in Chapter 1, Getting Started.