Главная
Study mode:
on
1
Intro
2
Disclaimer
3
What is Recon
4
Why DNS
5
Caveats of DNS • DNS is UDP so it is sensitive to the health of the connection path from the attacker to the
6
DNSRecon
7
Goals
8
Types of Enumeration
9
Standard Enumeration
10
Zone Transfer
11
Reverse Lookup
12
Domain Brute-force
13
Cache Snooping
14
NSEC Zone Walk
15
SRV RR Leakage
16
A RR Leakage
17
Parsing Data
18
Importing Data in to Metasploit
Description:
Explore DNS reconnaissance techniques in this 40-minute Derbycon 2012 conference talk by Carlos Perez. Delve into the fundamentals of DNS-based information gathering, including its importance, limitations, and various enumeration methods. Learn about standard enumeration, zone transfers, reverse lookups, domain brute-forcing, cache snooping, NSEC zone walking, and SRV/A record leakage. Discover how to parse and import gathered data into Metasploit for further exploitation. Gain valuable insights into the caveats of DNS, such as its UDP-based nature and sensitivity to connection path health.

DNS Reconnaissance Techniques - Derbycon 2012

Add to list