Active Method
Infrastructure Identification
Subdomain Enumeration
Zone Transfers
Is a method how a secondary DNS server (in a master-slave setup) receives information from the primary DNS server in order update its records.
Issues related to zone transfer
Type
Description
DNS Zone Transfer Misconfiguration
Attackers might exploit this in order to gain copy of the DNS records and obtain information
Enumeration techniques
1. Hacker Target
Tool Type: Web based
URL: https://hackertarget.com/zone-transfer/
2. Nslookup
Tool Type: Local
Step 1: Identify Nameservers
nslookup -type=NS <target domain>
Step 2: Test for ANY and AXFR zone transfer
nslookup -type=any -query=AXFR <target domain> <nameserver>
3. Gobuster
Tool Type: Local
Complementary tool/scripts/libraries: SecLists
Tip: if there's a pattern on the domain, you may opt to use pattern matching
gobuster dns -q -r <DNS server> -d <target domain> -w <wordlist> -p <pattern file> -o <filename output>
Virtual Hosts
Types of Virtual Hosting
IP-based - Host can have multiple network interfaces allowing servers or virtual servers running on the host bind to one or more IP addresses.
Name-based - Uses domain as method to identify which service/application was requested
Virtual Host Enumeration
Crawling
Web Crawling
Crawling websites are considered a systematic or automatic process of exploring.
Crawling Tools
Last updated