DNS domain transfer vulnerability exploitation and repair notes

Source: Internet
Author: User
Tags domain transfer fully qualified domain name

I. Title: DNS domain transfer vulnerability exploitation and repair

 

Ii. DNS domain transfer and utilization

2.1 use the BT5 tool to obtain DNS information

 

# Cd/pentest/enumeration/dns/dnsenum

#./Dnsenum. pl -- enum domain.com (you can omit -- enum. Note the distinction between the host name and domain name)

 

Domain names can also be recorded under each Domain name, and the complete host name (FQDN) is combined ). Host Name Fully Qualified Domain Name

FQDN (Domain name & Hostname) = www.ksu.edu.tw

Domain name = ksu.edu.tw

Hostname = www

Therefore, pay attention to the Domain name ---> domain.com [NOTE 1].

[NOTE 2 the link is very detailed]

Dnsmap is also available. For more information, see note 2.

E.g.: // example

#./Dnsmap target-domain.foo

 

 

2.2 General Method

It is recommended to use a manual method. The method is as follows:

> Nslookup

> Set type = ns

> Domain.com

> Server nsXXXXX.com (according to nameserver)

> Ls domain.com

 

Use the following command in 189store.com.txt to check the query result

 

 

III,Solution:

Ns1.okbuy.com (123.103.16.20.) and ns2.okbuy.com (123.103.16.132)

There is no access control definition ACL (Access Control List) to restrict cross-region transfer between domain name servers.

Edit/etc/named. conf

Set in zone configuration of okbuy.com

Allow-transfer {localhost; 123.103.16.133 ;};

Or

Allow-transfer {localhost; 123.103.16.132 ;};

 

Iv. Safe

4.1. Dns Security Policy,4.1.1 isolate the DNS server, and use the backup Domain Name Server 4.1.2 to hide the bind version 4.1.3. 4.1.4Chroot bind

4.1.5 prohibit regional transfer

Theoretical Explanation [NOTE 3]

 

4.2. DNS security tools

4.2.1 DNS Flood Detector

4.2.2 DNSSEC

4.2.3 DNSTOP

 

4.6,ExtensionDNS-iptables Port

# Grep domain/etc/services Query the port opened by dns

Iptables DNS port settings.

 

V. Reference Sources

Note 1: http://www.centos.bz/manual/vbird/linux_server/0350dns.php#theory

NOTE 2: BT4 Reading Notes (Chapter 4 dns information collection based on information gathering)

Http://www.bkjia.com/Article/201211/167664.html

NOTE 3: DNS domain transfer leakage vulnerability details http://www.bkjia.com/Article/201202/118349.html

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.