Penetration Testing mailing list archives

RE: DNS mapping


From: "Elias-Bachrach, Ari (721)" <ari.elias-bachrach () protiviti com>
Date: Sun, 25 Feb 2007 08:23:23 -0800

There was an article several years ago that covered this very well and
included a lot of perl code which you can copy:
www.illmob.org/files/text/hackingguide3.1.pdf

The tool bidiblah was then based off of a lot of the methods described
in the paper:
http://www.sensepost.com/research/bidiblah/

Both of those should prove useful to you.

Ari Elias-Bachrach
Senior Technology Risk Consultant
Protiviti
267 256 8857 (office)
267 256 8922 (fax)
Ari.Elias-Bachrach () protiviti com
 

-----Original Message-----
From: listbounce () securityfocus com [mailto:listbounce () securityfocus com]
On Behalf Of oivind.lund () gmail com
Sent: Saturday, February 17, 2007 9:39 PM
To: pen-test () securityfocus com
Subject: DNS mapping

I was wondering if there is an easy way to write a script to use for
reverse DNS mapping.
For instance, inputting the address test.com to the script and then
having the script reverse mapping the address and testing other common
DNS names like mail.test.com , web.test.com etc ?
Or maybe there is a tool available which allows me to do this and make
my own list of common DNS names ?

------------------------------------------------------------------------
This List Sponsored by: Cenzic

Need to secure your web apps?
Cenzic Hailstorm finds vulnerabilities fast.
Click the link to buy it, try it or download Hailstorm for FREE.

http://www.cenzic.com/products_services/download_hailstorm.php?camp=7016
00000008bOW
------------------------------------------------------------------------



------------------------------------------------------------------------------
NOTICE: Protiviti is a leading international provider of independent internal audit and business and technology risk 
consulting services. Protiviti is not licensed or registered as a public accounting firm and does not issue opinions on 
financial statements or offer attestation services.  

 

This electronic mail message is intended exclusively for the individual or entity to which it is addressed. This 
message, together with any attachment, may contain confidential and privileged information.  Any views, opinions or 
conclusions expressed in this message are those of the individual sender and do not necessarily reflect the views of 
Protiviti Inc. or its affiliates.  Any unauthorized review, use, printing, copying, retention, disclosure or 
distribution is strictly prohibited. If you have received this message in error, please immediately advise the sender 
by reply email message to the sender and delete all copies of this message. Thank you. 
==============================================================================


------------------------------------------------------------------------
This List Sponsored by: Cenzic

Need to secure your web apps?
Cenzic Hailstorm finds vulnerabilities fast.
Click the link to buy it, try it or download Hailstorm for FREE.

http://www.cenzic.com/products_services/download_hailstorm.php?camp=701600000008bOW
------------------------------------------------------------------------


Current thread: