官术网_书友最值得收藏!

Checking for a DNS BIND version

Being able to see which version of BIND a DNS server is running will give you some potentially great information. A lot of DNS servers out there are designed to not give up that information or reveal some generic information about its setup. But there are still a lot of BIND instances running out there that may reveal the exact version of BIND they are running. Using the version you glean from the following command, you can cross-reference that version against any known exploits, and if there are some, you now have a potential way in.

In the following example, I was able to grab the BIND server information from a publicly available DNS server. I have changed the name to protect the innocent:

root@pi-kali:~# host -c chaos -t txt version.bind DNS1.XXXX.NET
Using domain server:
Name: DNS1.XXXX.NET
Address: XXX.XXX.XXX.XXX#53
Aliases:
version.bind descriptive text "9.3.6-P1-RedHat-9.3.6-16.P1.1.2012012401"
主站蜘蛛池模板: 浦城县| 兰考县| 隆回县| 博客| 崇州市| 沽源县| 隆昌县| 和田市| 卓尼县| 梅州市| 甘洛县| 岳阳县| 郯城县| 吴川市| 信丰县| 勐海县| 苍溪县| 临沂市| 奎屯市| 荔波县| 咸宁市| 孝昌县| 承德市| 嵩明县| 黑山县| 息烽县| 溧阳市| 当雄县| 商河县| 柘城县| 崇信县| 延津县| 肃宁县| 福建省| 海城市| 延长县| 兰坪| 邵武市| 潼南县| 盐池县| 绥化市|