-
Notifications
You must be signed in to change notification settings - Fork 0
Activity 3.1 DNS Enumeration
DNS can be a treasure trove of information for penetration testers. Hostnames, naming conventions, hierarchical namespaces and of course IP resolution can focus your attack efforts. A misconfigured DNS server can also provide a great deal of information.
List out any commands that were used or found to be helpful during the process.
Document any notes that were taken while working on the assignment.
- Rewrite the portscanner to make portscanner2 where it scan against a network and a port, revealing which machines on the network have the port open.
-
Connect your Kali box to git and push the files that are being worked on
-
Write a new script (dns-resolver.sh) that takes a network prefix and a specific dns server in which to perform a lookup
-
Using Nmap Find DNS Servers but:
skip host discovery
use a grepable output to send results to dns-servers2.txt
only scan for a single tcp port across 10.0.5.0/24
only report "open" ports
see if you can use a bash 1 or 2 liner to list the unique IP addresses that respond to DNS loo4. Using Nmap Find DNS Servers but:
- Use Grep/Cut/Etc to format the output
**List out any issues that were encountered while working on the assignment. **
- In Deliverable 6 (pictured below), I was not able to figure out why my scan was not working. After many attempts of changing tags, commands, etc., I had realized I typed in the wrong dns address.
- For deliverable 7, I am having issues with correcting the command to only include the IPS. Picture and progress below.
If any issues were solved, list out the resolutions for each problem.
I had the
grep -E
field incorrect and I have it rewritten here.
List out any questions that arose while working on the assignment.
N/A