Extracting Information From DNS

IT | Dec 9, 2017 | Master3395

DNS servers are an attractive target for attackers and penetration testers. They regularly include data that is considered highly important to attackers.

DNS is a core element of both our local networks and the Internet. Among other things, DNS is responsible for the process of translating domain names to IP addresses. For humans, it is much simpler for them to remember “google.com” rather than But, machines prefer the reverse. DNS serves as the middleman to make this translation process.

As penetration testers, it is necessary to concentrate on the DNS servers that belong to our target. The reason is simple. In order for DNS to function correctly, it needs to be aware of both the IP address and the corresponding domain name of each machine on its network.

In terms of reconnaissance, obtaining full access to an organization’s DNS server is like finding a pot of gold at the end of a rainbow. Or perhaps, more correctly, it is like finding a blueprint for the organization. But in this example, the blueprint includes a complete listing of private IP addresses that belong to our target. Remember one of the key components of data gathering is to collect IP addresses that belong to the target.

Keywords: dns, extract, information

Author: Master3395


comments powered by Disqus

Page 1 of 406  >  >>

Visa, MasterCard and Uber invest in Facebook's crypto currency


Jun 18, 2019 | Category: General | Comments

May be announced next week.

read more…

Google boss annoyed at Apple


Jun 17, 2019 | Category: IT | Comments

Think they are portrayed as corrupt during the unveiling of "Sign in with Apple".

read more…

Telegram exposed to massive DDoS attacks - claims China is behind


Jun 16, 2019 | Category: General | Comments

Linked to the demonstrations in Hong Kong.

read more…

Page 1 of 406  >  >>