NsAlias - Random NS Aliases
This module is designed to return one or more random aliases using NS (Name Server) records.
It specifically generates a random NS alias record in the format nsalias######.yourdomain.com
, where ######
represents a random number.
The idea is that if the client/resolver decides to resolve this further, it will result in the generation of yet another alias, theoretically leading to a resolution of infinite chain of random aliases. In practice, however, most modern resolvers will terminate the resolution after encountering several consecutive alias records.
Note that this feature provides the same functionality as requesting the NS record for the generic alias feature. Responding with multiple records (aliases) in a single response is also supported.
Category: Aliases
Tags: Amplification, Domain Lock-Up, Denial of Service
RFCs: RFC1035
Format
nsalias.<NUMBER>.yourdomain.com
Where:
- The
<NUMBER>
parameter defines how many aliases should be generated in the response.
Examples
By default, it returns a single NS alias:
# dig nsalias.yourdomain.com @127.0.0.1 ; <<>> DiG 9.18.10-2-Debian <<>> nsalias.yourdomain.com @127.0.0.1 ;; global options: +cmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 41927 ;; flags: qr aa; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0 ;; QUESTION SECTION: ;nsalias.yourdomain.com. IN A ;; ANSWER SECTION: nsalias.yourdomain.com. 60 IN NS nsalias819058.yourdomain.com. ;; Query time: 0 msec ;; SERVER: 127.0.0.1#53(127.0.0.1) (UDP) ;; WHEN: Wed Oct 16 09:37:12 +04 2024 ;; MSG SIZE rcvd: 82
Same example as above, but this time we explicitly specify that we want to receive a single NS record:
# dig nsalias.1.yourdomain.com @127.0.0.1 ; <<>> DiG 9.18.10-2-Debian <<>> nsalias.1.yourdomain.com @127.0.0.1 ;; global options: +cmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 14846 ;; flags: qr aa; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0 ;; QUESTION SECTION: ;nsalias.1.yourdomain.com. IN A ;; ANSWER SECTION: nsalias.1.yourdomain.com. 60 IN NS nsalias328570.1.yourdomain.com. ;; Query time: 0 msec ;; SERVER: 127.0.0.1#53(127.0.0.1) (UDP) ;; WHEN: Wed Oct 16 09:37:14 +04 2024 ;; MSG SIZE rcvd: 86
In this case, we specify that we want to receive five NS aliases:
# dig nsalias.5.yourdomain.com @127.0.0.1 ; <<>> DiG 9.18.10-2-Debian <<>> nsalias.5.yourdomain.com @127.0.0.1 ;; global options: +cmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 23339 ;; flags: qr aa; QUERY: 1, ANSWER: 5, AUTHORITY: 0, ADDITIONAL: 0 ;; QUESTION SECTION: ;nsalias.5.yourdomain.com. IN A ;; ANSWER SECTION: nsalias.5.yourdomain.com. 60 IN NS nsalias486130.5.yourdomain.com. nsalias.5.yourdomain.com. 60 IN NS nsalias559338.5.yourdomain.com. nsalias.5.yourdomain.com. 60 IN NS nsalias36708.5.yourdomain.com. nsalias.5.yourdomain.com. 60 IN NS nsalias928003.5.yourdomain.com. nsalias.5.yourdomain.com. 60 IN NS nsalias591080.5.yourdomain.com. ;; Query time: 4 msec ;; SERVER: 127.0.0.1#53(127.0.0.1) (UDP) ;; WHEN: Wed Oct 16 09:37:15 +04 2024 ;; MSG SIZE rcvd: 261
From the same category
- Alias - Random Aliases
- CnAlias - Random CNAME Aliases
- DnAlias - Random DNAME Aliases
- HtAlias - Random HTTPS Aliases
- MxAlias - Random MX Aliases
- NptEnumAlias - Random NAPTR ENUM Aliases
- PtrAlias - Random PTR Aliases
- SpfAlias1 - Random SPF (TXT) Aliases (Variant 1)
- SpfAlias2 - Random SPF (TXT) Aliases (Variant 2)
- SrAlias - Random SRV Aliases
- SvAlias - Random SVCB Aliases