Today
we are going to perform DNS enumeration with Kali Linux platform only. It has
in-built tool for DNS enumeration. For this tutorial you must be aware of DNS
server and its records, if you are not much aware of DNS then read our previous
article “Setup
DNS Penetration Testing Lab on Windows Server 2012”.
Nmap
Following command will try to discover hosts' services using the DNS Service
Discovery protocol. It sends a multicast DNS-SD query and collects all the
responses.
The script first sends a query for
_services._dns-sd._udp.local to get a list of services. It then sends a follow up
query for each one to try to get more information.
nmap --script=broadcast-dns-service-discovery.
From given screenshot you
can observe the running service on a DNS server.
Following command will try to enumerate DNS hostnames by brute force guessing of
common subdomains. With the
dns-brute.srv
argument, dns-brute will also try to enumerate common
DNS SRV records.
Wildcard records are
listed as "*A" and "*AAAA" for IPv4 and IPv6 respectively.
From screenshot you can
observe DNS hostname
By default, the DNS server performs
recursive queries on behalf of its DNS clients and DNS servers that have
forwarded DNS client queries to it
Attackers can use recursion to deny the
DNS Server service. Therefore, if a DNS server in your network is not intended
to receive recursive queries, recursion should be disabled on that server
Following command will Checks if a
DNS server allows queries for third-party names. It is expected that recursion
will be enabled on your own internal nameservers.
From https://technet.microsoft.com
Nmap -Pn -sU -p 53 --script=dns-recursion 192.168.1.150
As result
you can observe that recursion is enable on targeted system
Following
command will enumerates various common service (SRV) records for a given domain
name. The service records contain the hostname, port and priority of servers
for a given service. The following services are enumerated by the script: -
Active Directory Global Catalog - Exchange Autodiscovery - Kerberos KDC Service
- Kerberos Passwd Change Service - LDAP Servers - SIP Servers - XMPP S2S - XMPP
C2S
nmap --script dns-srv-enum --script-args
"dns-srv-enum.domain=’google.com’
DNSEnum
Multithreaded perl
script to enumerate DNS information of a domain and to discover non-contiguous
ip blocks.
OPERATIONS:
·
Get the
host’s addresse (A record).
·
Get the
namservers (threaded).
·
Get the
MX record (threaded).
·
Perform
axfr queries on nameservers and get BIND VERSION (threaded).
·
Get extra
names and subdomains via google scraping (google query = “allinurl: -www
site:domain”).
·
Brute
force subdomains from file, can also perform recursion on subdomain that have
NS records (all threaded).
·
Calculate
C class domain network ranges and perform whois queries on them (threaded).
·
Perform
reverse lookups on netranges ( C class or/and whois netranges) (threaded).
·
Write to
domain_ips.txt file ip-blocks.
Following command
will avoid enumeration of reverse lookup and save the output result into xml
format.
dnsenum --noreverse -o mydomain.xml hackingarticles.in
DNSRecon
DNSRecon provides
the ability to perform:
1.
Check all
NS Records for Zone Transfers
2.
Enumerate
General DNS Records for a given Domain (MX, SOA, NS, A, AAAA, SPF and TXT)
3.
Perform
common SRV Record Enumeration. Top Level Domain (TLD) Expansion
4.
Check for
Wildcard Resolution
5.
Brute
Force subdomain and host A and AAAA records given a domain and a wordlist
6.
Perform a
PTR Record lookup for a given IP Range or CIDR
7.
Check a
DNS Server Cached records for A, AAAA and CNAME Records provided a list of host
records in a text file to check
8.
Enumerate
Common mDNS
records in the Local Network Enumerate Hosts and Subdomains using Google
Following command will enumerate DNS record of targeted
website
dnsrecon-d
hackingarticles.in
You can observe the result from given below image.
Fierce
Fierce
is a reconnaissance tool. Fierce is a PERL script that quickly scans domains
(usually in just a few minutes, assuming no network lag) using several tactics.
Type
following command for DNS enumeration on targeted website
Fierce-dns hackingarticles.in
From screenshot you can see that we have scanned almost
same result as from above tools.
0 comments:
Post a Comment