-
Book Overview & Buying
-
Table Of Contents
Network Protocols for Security Professionals
By :
As the DNS protocol is very important, it is a favorite target for attackers. DNS has numerous loopholes, so let’s discuss the loopholes in the DNS protocol and how to identify them.
We will follow the same penetration-testing approach for DNS discovery:
DNS enumeration in penetration testing is sometimes referred to as information gathering related to a specific service that narrows down the first level of footprinting. In this chapter, we will only be performing reconnaissance on a DNS service; hence, it is called DNS footprinting.
Now, we know that DNS works on port 53; hence, our major focus will be on this port only.
Let’s find all the domain name records using the nslookup or dig utility, as shown in the following screenshot:
Figure 13.4 – DNS records
The preceding figure...
Change the font size
Change margin width
Change background colour