- Penetration Testing Bootcamp
- Jason Beltrame
- 258字
- 2021-07-02 21:35:57
Enumerating DNS with dnsmap
dnsmap is a fantastic tool to find subdomains within the domain you are looking for. It's a great way to see whether other sites are publicly available (internally and/or externally) that may or may not be known. This allows you to potentially find and exploit a subdomain that may not be controlled or administered correctly. You can provide your own word list to look up against the subdomains, or you can use the built-in one. Some organizations offload some subdomains to third parties, so you need to be cautious how you use this information. The scope of work may only cover the company you are hired for; and therefore, you may not be looked upon so kindly by the other organization if you are trying to actively exploit it. This should be worked out in the stakeholders meeting, but sometimes things do slip through the floor. The following is a screenshot of the command-line options for dnsmap:

We can then take a domain that we are looking at, in this case https://www.mozilla.org, and see which other subdomains may exist. The following screenshot shows the output of the dnsmap command against Mozilla.org:

With this information, we can now start to probe additional IP addresses/sites that we might not have known about in the past, which can increase the attack/penetration-testing surface in which we can work against. The more the targets, the better the chance we have of getting in and being able to include that in our penetration report that we will deliver.
- JavaScript全程指南
- Python機器學習:數(shù)據分析與評分卡建模(微課版)
- Unity Virtual Reality Projects
- 深入淺出Windows API程序設計:編程基礎篇
- Learn Swift by Building Applications
- 編譯系統(tǒng)透視:圖解編譯原理
- 網站構建技術
- C# 8.0核心技術指南(原書第8版)
- Android玩家必備
- 微信小程序開發(fā)與實戰(zhàn)(微課版)
- UML2面向對象分析與設計(第2版)
- C指針原理揭秘:基于底層實現(xiàn)機制
- Web Developer's Reference Guide
- C語言從入門到精通
- PHP動態(tài)網站開發(fā)實踐教程