6.DNS
I. DNS Basics
Function: Translates domain names to IP addresses.
Ports:
UDP/53 (default)
TCP/53 (for zone transfers and large packets)
Importance: Critical for network applications.
Attack Vectors:
DNS zone transfers.
Domain/subdomain takeovers.
DNS spoofing/cache poisoning.
II. Enumeration
Nmap:
III. DNS Zone Transfers
Function: Copies DNS zone data between servers.
Vulnerability: Misconfigurations allow unauthorized transfers.
Tools:
IV. Domain/Subdomain Takeovers
Domain Takeover: Registering expired domains.
Subdomain Takeover: Claiming subdomains pointing to expired services (via CNAME records).
Subdomain Enumeration Tools:
CNAME Record Enumeration:
Subdomain Takeover Verification:
Check for "NoSuchBucket" errors (AWS S3).
Use can-i-take-over-xyz repository.
V. DNS Spoofing/Cache Poisoning
Function: Injecting false DNS records.
Methods:
Man-in-the-Middle (MITM) attacks.
Exploiting DNS server vulnerabilities.
Local DNS Cache Poisoning (MITM):
VI. Latest DNS Vulnerabilities
Subdomain Takeover (CNAME Records):
Exploiting forgotten CNAME records pointing to expired third-party services.
Risks: Phishing, cookie stealing, CSRF, CORS abuse, CSP bypass.
Key Commands Summary
Nmap:
dig:
Fierce:
Subfinder:
Subbrute:
host:
nslookup:
Ettercap:
Edit
/etc/ettercap/etter.dns
.Use Ettercap GUI (scan, targets, plugins).
Last updated