DNS (53)

Dig NS query

dig ns inlanefreight.htb @10.129.14.128

Dig version query

dig CH TXT version.bind 10.129.120.85

Dig ANY query

dig any inlanefreight.htb @10.129.14.128

Zone Transfer

Dig AXFR (asynchronous full transfer zone)

dig axfr inlanefreight.htb @10.129.14.128

Using Fierce for Zone Transfer

Fiercearrow-up-right

# fierce --domain zonetransfer.me

Bruteforcing subdomains

Using dig

for sub in $(cat /opt/useful/SecLists/Discovery/DNS/subdomains-top1million-110000.txt);do dig $sub.inlanefreight.htb @10.129.14.128 | grep -v ';\|SOA' | sed -r '/^\s*$/d' | grep $sub | tee -a subdomains.txt;done

Using DNSEnum

Using subbrute

Using subfinder for enumeration

Notes:

axfr can only be used if port 53 is open BIND9 CVEs ISC Bind : CVE security vulnerabilities, versions and detailed reports (cvedetails.com)arrow-up-right

Subdomain Takeover

Check CNAME

https://github.com/EdOverflow/can-i-take-over-xyzarrow-up-right

DNS Spoofing

DNS Cache Poisoning

Local DNS Cache Poisoning

  1. In ettercap, Hosts > Scan for Hosts

  2. Add Target IP to target1; Add a default gateway to target2

  3. Activate DNS spoof, Plugins > Manage Plugins

Last updated