官术网_书友最值得收藏!

Checking for a DNS BIND version

Being able to see which version of BIND a DNS server is running will give you some potentially great information. A lot of DNS servers out there are designed to not give up that information or reveal some generic information about its setup. But there are still a lot of BIND instances running out there that may reveal the exact version of BIND they are running. Using the version you glean from the following command, you can cross-reference that version against any known exploits, and if there are some, you now have a potential way in.

In the following example, I was able to grab the BIND server information from a publicly available DNS server. I have changed the name to protect the innocent:

root@pi-kali:~# host -c chaos -t txt version.bind DNS1.XXXX.NET
Using domain server:
Name: DNS1.XXXX.NET
Address: XXX.XXX.XXX.XXX#53
Aliases:
version.bind descriptive text "9.3.6-P1-RedHat-9.3.6-16.P1.1.2012012401"
主站蜘蛛池模板: 林口县| 泰来县| 泰顺县| 贵州省| 建阳市| 山丹县| 合川市| 无为县| 林芝县| 农安县| 吉水县| 武隆县| 绵竹市| 武汉市| 泸溪县| 习水县| 甘洛县| 佛冈县| 方山县| 伽师县| 吉隆县| 阳新县| 曲靖市| 荥阳市| 双江| 长丰县| 南木林县| 岑溪市| 台东市| 察隅县| 镇宁| 广灵县| 万全县| 陵川县| 赣榆县| 晋城| 陇川县| 渭源县| 自治县| 黔西县| 望奎县|