DNS - Port 53
Basic info
PORT STATE SERVICE REASON
53/tcp open domain Microsoft DNS 6.1.7601 (1DB15D39) (Windows Server 2008 R2 SP1)
5353/udp open zeroconf udp-response
53/udp open domain Microsoft DNS 6.1.7601 (1DB15D39) (Windows Server 2008 R2 SP1)Key DNS Concepts
Config files
Attack workflow
1. Reconnaissance and Enumeration
2. DNS Zone Transfer Attack
3. DNS Subdomain Bruteforcing
4. Reverse DNS Lookup
5. DNS ANY Query
6. DNSSEC Exploitation
7. DNS Amplification Attack (DDoS Simulation)
8. Active Directory DNS Service Enumeration
9. IPv6 DNS Bruteforcing
10. Exploit Misconfigured Mail Servers
Penetration Testing Techniques for DNS
Banner Grabbing
Zone Transfer
ANY Query Enumeration
Subdomain Brute-Forcing
Reverse DNS Enumeration
DNSSEC Vulnerability Scanning
DNS Recursion Testing
Mail Server Enumeration via DNS
Active Directory DNS Service Enumeration
IPv6 DNS Bruteforce
Last updated