Enumeration of common services

DNS Enumeration, Enumeration of common services

Domain takeover

Domain takeover means registering a non-existent domain name to gain control of another domain. If attackers find an expired domain (here’s how to find them [8 – Finding Expired Domains]), they can hijack that domain to carry out other attacks, such as hosting malicious content on a website or sending a phishing email using the […]

Enumeration of common services

Brute Force Attacks Subdomains

See [[2 – DNS Server Enumeration Port 53]] part of subdomains Tools There are several tools available that excel at brute-force enumeration: Tool Description dnseno Comprehensive DNS enumeration tool that supports dictionary and brute-force attacks to discover subdomains. fierce Easy-to-use tool for recursive subdomain discovery, with wildcard detection and a user-friendly interface. dnsrescon Versatile tool

DNS Enumeration, Enumeration of common services

Dig DNS Commands

The dig command (Domain Information Groper) is a versatile and powerful utility for querying DNS servers and retrieving various types of DNS records. Its flexibility and detailed, customizable output make it an ideal choice. Common dig Commands Domain Description dig domain.com Performs a default A record lookup for the domain. dig domain.com A Retrieves the

DNS Enumeration, Enumeration of common services

1 – DNS Configurations

Default Configuration All DNS servers work with three different types of configuration files: 1. Local DNS configuration files 2. Zone files 3. Reverse name resolution files DNS Server [Bind9](https://www.isc.org/bind/) It is widely used in Linux-based distributions. Its local configuration file (named.conf) is divided into two parts: 1 – The options section for general configuration 2

Scroll to Top