官术网_书友最值得收藏!

Enumerating DNS with dnsmap

dnsmap is a fantastic tool to find subdomains within the domain you are looking for. It's a great way to see whether other sites are publicly available (internally and/or externally) that may or may not be known. This allows you to potentially find and exploit a subdomain that may not be controlled or administered correctly. You can provide your own word list to look up against the subdomains, or you can use the built-in one. Some organizations offload some subdomains to third parties, so you need to be cautious how you use this information. The scope of work may only cover the company you are hired for; and therefore, you may not be looked upon so kindly by the other organization if you are trying to actively exploit it. This should be worked out in the stakeholders meeting, but sometimes things do slip through the floor. The following is a screenshot of the command-line options for dnsmap:

We can then take a domain that we are looking at, in this case https://www.mozilla.org, and see which other subdomains may exist. The following screenshot shows the output of the dnsmap command against Mozilla.org:

With this information, we can now start to probe additional IP addresses/sites that we might not have known about in the past, which can increase the attack/penetration-testing surface in which we can work against. The more the targets, the better the chance we have of getting in and being able to include that in our penetration report that we will deliver.

主站蜘蛛池模板: 海宁市| 湘潭县| 石门县| 抚松县| 伊春市| 海伦市| 阿图什市| 花莲市| 车致| 北海市| 漳平市| 馆陶县| 景泰县| 梅州市| 蓬莱市| 措勤县| 定日县| 张家川| 饶河县| 义马市| 北川| 铜山县| 苍南县| 安义县| 定西市| 吴江市| 金坛市| 阿鲁科尔沁旗| 东源县| 百色市| 青河县| 阳城县| 虞城县| 辉南县| 莎车县| 西平县| 南丰县| 鲁山县| 东丰县| 惠水县| 海丰县|