官术网_书友最值得收藏!

Enumerating DNS with dnsmap

dnsmap is a fantastic tool to find subdomains within the domain you are looking for. It's a great way to see whether other sites are publicly available (internally and/or externally) that may or may not be known. This allows you to potentially find and exploit a subdomain that may not be controlled or administered correctly. You can provide your own word list to look up against the subdomains, or you can use the built-in one. Some organizations offload some subdomains to third parties, so you need to be cautious how you use this information. The scope of work may only cover the company you are hired for; and therefore, you may not be looked upon so kindly by the other organization if you are trying to actively exploit it. This should be worked out in the stakeholders meeting, but sometimes things do slip through the floor. The following is a screenshot of the command-line options for dnsmap:

We can then take a domain that we are looking at, in this case https://www.mozilla.org, and see which other subdomains may exist. The following screenshot shows the output of the dnsmap command against Mozilla.org:

With this information, we can now start to probe additional IP addresses/sites that we might not have known about in the past, which can increase the attack/penetration-testing surface in which we can work against. The more the targets, the better the chance we have of getting in and being able to include that in our penetration report that we will deliver.

主站蜘蛛池模板: 阿瓦提县| 滁州市| 克拉玛依市| 类乌齐县| 周至县| 那曲县| 衡东县| 囊谦县| 揭东县| 河北区| 宁陕县| 万宁市| 浦东新区| 舞钢市| 高邮市| 巍山| 谢通门县| 利辛县| 达拉特旗| 仁布县| 鸡西市| 昭平县| 洪泽县| 巩留县| 阳谷县| 平利县| 嘉荫县| 新津县| 黔东| 政和县| 宜宾县| 永胜县| 普定县| 阳高县| 杨浦区| 廉江市| 大足县| 西华县| 玉溪市| 类乌齐县| 德保县|