官术网_书友最值得收藏!

DNS reconnaissance and route mapping

Once a tester has identified targets that have an online presence and are of interest, the next step is to identify the IP addresses and routes to the target.

DNS reconnaissance involves identifying who owns a particular domain or series of IP addresses (whois-type information), the DNS information defining the actual domain names and IP addresses assigned to the target, and the route between the penetration tester, or the attacker, and the final target.

This information gathering is semi-active – some of the information is available from freely available open sources, while other information is available from third parties such as DNS registrars. Although the registrar may collect IP addresses and data concerning requests made by the attacker, it is rarely provided to the end target. Information that could be directly monitored by the target, such as DNS server logs, is almost never reviewed or retained.

Because the information needed can be queried using a defined systematic and methodical approach, its collection can be automated.

Note that DNS information may contain stale or incorrect entries. To minimize inaccurate information, query different source servers and use different tools to cross-validate results. Review results, and manually verify any suspect findings. Use a script to automate the collection of this information. This script should create a folder for the penetration test, and then a series of folders for each application being run. After the script executes each command, pipe the results directly to the specific holding folder.
主站蜘蛛池模板: 廊坊市| 铜梁县| 河南省| 诏安县| 江西省| 屯门区| 习水县| 玉山县| 南宫市| 耒阳市| 张北县| 宁津县| 图木舒克市| 尚义县| 确山县| 巴里| 九龙县| 喀喇沁旗| 六盘水市| 柏乡县| 宾川县| 花莲县| 松阳县| 信阳市| 灌云县| 嵊泗县| 怀来县| 乌兰浩特市| 上蔡县| 招远市| 大冶市| 京山县| 高邮市| 双鸭山市| 仙游县| 芒康县| 康乐县| 乐业县| 宣威市| 炎陵县| 连云港市|