- Penetration Testing Bootcamp
- Jason Beltrame
- 152字
- 2021-07-02 21:35:58
Checking for a DNS BIND version
Being able to see which version of BIND a DNS server is running will give you some potentially great information. A lot of DNS servers out there are designed to not give up that information or reveal some generic information about its setup. But there are still a lot of BIND instances running out there that may reveal the exact version of BIND they are running. Using the version you glean from the following command, you can cross-reference that version against any known exploits, and if there are some, you now have a potential way in.
In the following example, I was able to grab the BIND server information from a publicly available DNS server. I have changed the name to protect the innocent:
root@pi-kali:~# host -c chaos -t txt version.bind DNS1.XXXX.NET
Using domain server:
Name: DNS1.XXXX.NET
Address: XXX.XXX.XXX.XXX#53
Aliases:
version.bind descriptive text "9.3.6-P1-RedHat-9.3.6-16.P1.1.2012012401"
推薦閱讀
- Instant Apache Stanbol
- Visual Basic 6.0程序設計計算機組裝與維修
- Mastering Concurrency in Go
- Spring Boot+Spring Cloud+Vue+Element項目實戰:手把手教你開發權限管理系統
- NativeScript for Angular Mobile Development
- Learn WebAssembly
- 利用Python進行數據分析(原書第3版)
- C語言程序設計
- Corona SDK Mobile Game Development:Beginner's Guide(Second Edition)
- 西門子S7-200 SMART PLC編程從入門到實踐
- Building Microservices with .NET Core
- Exploring SE for Android
- 軟件測試分析與實踐
- Drupal 8 Development Cookbook(Second Edition)
- Mastering XenApp?