官术网_书友最值得收藏!

Checking for a DNS BIND version

Being able to see which version of BIND a DNS server is running will give you some potentially great information. A lot of DNS servers out there are designed to not give up that information or reveal some generic information about its setup. But there are still a lot of BIND instances running out there that may reveal the exact version of BIND they are running. Using the version you glean from the following command, you can cross-reference that version against any known exploits, and if there are some, you now have a potential way in.

In the following example, I was able to grab the BIND server information from a publicly available DNS server. I have changed the name to protect the innocent:

root@pi-kali:~# host -c chaos -t txt version.bind DNS1.XXXX.NET
Using domain server:
Name: DNS1.XXXX.NET
Address: XXX.XXX.XXX.XXX#53
Aliases:
version.bind descriptive text "9.3.6-P1-RedHat-9.3.6-16.P1.1.2012012401"
主站蜘蛛池模板: 城口县| 井陉县| 饶河县| 香河县| 英德市| 吉木乃县| 肇东市| 云南省| 化德县| 淳化县| 会泽县| 南丹县| 高雄县| 乡城县| 广汉市| 东兰县| 平定县| 迁西县| 西藏| 武定县| 龙里县| 宝应县| 柳林县| 且末县| 响水县| 行唐县| 沈丘县| 石景山区| 雷州市| 嘉荫县| 石屏县| 满洲里市| 广宁县| 大关县| 昌图县| 阳谷县| 古蔺县| 霸州市| 依兰县| 托克逊县| 尉氏县|