githubEdit

6. DNS

I. DNS Basics

  • Function: Translates domain names to IP addresses.

  • Ports:

    • UDP/53 (default)

    • TCP/53 (for zone transfers and large packets)

  • Importance: Critical for network applications.

  • Attack Vectors:

    • DNS zone transfers.

    • Domain/subdomain takeovers.

    • DNS spoofing/cache poisoning.

II. Enumeration

  • Nmap:

nmap -p53 -Pn -sV -sC <target_IP>

III. DNS Zone Transfers

  • Function: Copies DNS zone data between servers.

  • Vulnerability: Misconfigurations allow unauthorized transfers.

  • Tools:

IV. Domain/Subdomain Takeovers

  • Domain Takeover: Registering expired domains.

  • Subdomain Takeover: Claiming subdomains pointing to expired services (via CNAME records).

  • Subdomain Enumeration Tools:

  • CNAME Record Enumeration:

  • Subdomain Takeover Verification:

    • Check for "NoSuchBucket" errors (AWS S3).

    • Use can-i-take-over-xyz repository.

V. DNS Spoofing/Cache Poisoning

  • Function: Injecting false DNS records.

  • Methods:

    • Man-in-the-Middle (MITM) attacks.

    • Exploiting DNS server vulnerabilities.

  • Local DNS Cache Poisoning (MITM):

VI. Latest DNS Vulnerabilities

  • Subdomain Takeover (CNAME Records):

    • Exploiting forgotten CNAME records pointing to expired third-party services.

    • Risks: Phishing, cookie stealing, CSRF, CORS abuse, CSP bypass.

Key Commands Summary

  • Nmap:

  • dig:

  • Fierce:

  • Subfinder:

  • Subbrute:

  • host:

  • nslookup:

  • Ettercap:

    • Edit /etc/ettercap/etter.dns.

    • Use Ettercap GUI (scan, targets, plugins).

Last updated