file-signatureDNS Pentesting Notes

Protocol Overview

Basic Information

  • Port: UDP/TCP 53

  • Protocol Type: Application layer

  • Purpose: Domain name resolution to IP addresses

  • Security: Minimal built-in security, often unencrypted

DNS Server Types

  1. Root Servers

    • Manages TLDs

    • 13 servers worldwide

    • Governed by ICANN

  2. Authoritative Servers

    • Hold authority over specific zones

    • Provide definitive answers

  3. Non-authoritative/Caching Servers

    • Store temporary DNS information

    • Forward queries to other servers

Initial Enumeration

Basic DNS Queries

Record Types and Queries

Common Record Types

Record
Purpose

A

IPv4 address mapping

AAAA

IPv6 address mapping

MX

Mail server records

NS

Nameserver records

TXT

Miscellaneous information

CNAME

Domain aliases

PTR

Reverse DNS lookups

SOA

Zone authority info

Querying Records

Zone Transfers

Testing Zone Transfers

Automated Zone Transfer Tools

Subdomain Enumeration

Using DNS Tools

Bash One-liners

Common NSE Scripts

Configuration Files

BIND Configuration

  • Main config: /etc/bind/named.conf

  • Local zones: /etc/bind/named.conf.local

  • Options: /etc/bind/named.conf.options

  • Zone files: /var/cache/bind/

  • Logs: /var/log/named/

Common Misconfigurations

  1. Zone Transfers:

    • Unrestricted transfers

    • Missing allow-transfer directive

  2. Recursion:

    • Open recursion

    • Missing allow-recursion directive

  3. Version Info:

    • Version disclosure

    • Unnecessary information leakage

Advanced Techniques

DNS Cache Snooping

DNS Amplification Testing

Common Vulnerabilities

  1. Misconfiguration Issues:

    • Open zone transfers

    • Recursive queries allowed

    • Information disclosure

    • Weak access controls

  2. Protocol Weaknesses:

    • Cache poisoning

    • DNS tunneling

    • Zone walking

    • Amplification attacks

  3. Implementation Issues:

    • Buffer overflows

    • DoS vulnerabilities

    • BIND vulnerabilities

Post Exploitation

Information Gathering

  • Map network infrastructure

  • Identify internal domains

  • Discover host naming patterns

  • Find related domains

  • Locate sensitive records

Further Enumeration

  • Internal DNS servers

  • Split-horizon DNS

  • Dynamic DNS zones

  • DNSSEC configuration

  • Secondary servers

Common Response Codes

Code
Meaning

NOERROR

Query successful

NXDOMAIN

Domain not found

SERVFAIL

Server failure

REFUSED

Query refused

FORMERR

Format error

Best Practices for Pentesting

  1. Initial Reconnaissance:

    • Identify DNS servers

    • Check version info

    • Test basic queries

    • Look for zone transfers

  2. Deep Enumeration:

    • Brute force subdomains

    • Check all record types

    • Test for misconfigurations

    • Map DNS infrastructure

  3. Documentation:

    • Record all findings

    • Note server versions

    • Document vulnerabilities

    • Save evidence

  4. Risk Assessment:

    • Evaluate impact

    • Consider data sensitivity

    • Check exploitation potential

    • Recommend fixes

Common Tools

  1. Enumeration:

    • dig

    • nslookup

    • host

    • dnsenum

    • fierce

  2. Subdomain Discovery:

    • gobuster

    • Sublist3r

    • Amass

    • Subfinder

  3. Analysis:

    • dnsrecon

    • dnswalk

    • dnsmap

    • massdns

Remember to always have proper authorization before testing and document all findings thoroughly.