Skip to content

Activity 3.1 DNS Enumeration

dthomsen116 edited this page Feb 5, 2023 · 6 revisions

Thomsen Tech Journal

Stated Goal of the Assignment

DNS can be a treasure trove of information for penetration testers. Hostnames, naming conventions, hierarchical namespaces and of course IP resolution can focus your attack efforts. A misconfigured DNS server can also provide a great deal of information.

Useful Commands

List out any commands that were used or found to be helpful during the process.

Steps from the Process

Document any notes that were taken while working on the assignment.

  1. Rewrite the portscanner to make portscanner2 where it scan against a network and a port, revealing which machines on the network have the port open.

image

  1. Connect your Kali box to git and push the files that are being worked on

  2. Write a new script (dns-resolver.sh) that takes a network prefix and a specific dns server in which to perform a lookup

  3. Using Nmap Find DNS Servers but:

skip host discovery

use a grepable output to send results to dns-servers2.txt

only scan for a single tcp port across 10.0.5.0/24

only report "open" ports

see if you can use a bash 1 or 2 liner to list the unique IP addresses that respond to DNS loo4. Using Nmap Find DNS Servers but:

image

  1. Use Grep/Cut/Etc to format the output

Troubles Encountered

**List out any issues that were encountered while working on the assignment. **

  1. In Deliverable 6 (pictured below), I was not able to figure out why my scan was not working. After many attempts of changing tags, commands, etc., I had realized I typed in the wrong dns address.
  • image
  1. For deliverable 7, I am having issues with correcting the command to only include the IPS. Picture and progress below.
  • image

Resolutions

If any issues were solved, list out the resolutions for each problem.

  • image

I had the grep -E field incorrect and I have it rewritten here.

Further Questions

List out any questions that arose while working on the assignment.

N/A