小白日记3:kali渗透测试之被动信息收集(二)-dig、whios、dnsenum、fierce

一、DIG

linux下查询域名解析有两种选择,nslookup或者dig。Dig(Domain Information Groper)是一个在类Unix命令行模式下查询DNS包括NS记录,A记录,MX记录等相关信息的工具。


<span style="font-size:18px;">root@kali:~# dig -h
Usage:  dig [@global-server] [domain] [q-type] [q-class] {q-opt}
            {global-d-opt} host [@local-server] {local-d-opt}
            [ host [@local-server] {local-d-opt} [...]]
Where:  domain	  is in the Domain Name System
        q-class  is one of (in,hs,ch,...) [default: in]
        q-type   is one of (a,any,mx,ns,soa,hinfo,axfr,txt,...) [default:a] <strong>#类型(……)默认a</strong>
                 (Use ixfr=version for type ixfr)
        q-opt    is one of:
                 -x dot-notation     (shortcut for reverse lookups)         #反向查询
                 -i                  (use IP6.INT for IPv6 reverse lookups) #使用IPv6反向查询
                 -f filename         (batch mode)                           #批处理模式
                 -b address[#port]   (bind to source address/port)          #绑定到源地址/端口
                 -p port             (specify port number)                  #指定端口名称
                 -q name             (specify query name)                   #指定查询名称
                 -t type             (specify query type)                   #指定查询类型
                 -c class            (specify query class)
                 -k keyfile          (specify tsig key file)
                 -y [hmac:]name:key  (specify named base64 tsig key)
                 -4                  (use IPv4 query transport only)
                 -6                  (use IPv6 query transport only)
                 -m                  (enable memory usage debugging)
        d-opt    is of the form +keyword[=value], where keyword is:
                 +[no]vc             (TCP mode)                        
                 +[no]tcp            (TCP mode, alternate syntax)
                 +time=###           (Set query timeout) [5]            #指定超时设定
                 +tries=###          (Set number of UDP attempts) [3]   #设置UDP发包数
                 +retry=###          (Set number of UDP retries) [2]    #设置UDP重试次数
                 +domain=###         (Set default domainname)
                 +bufsize=###        (Set EDNS0 Max UDP packet size)
                 +ndots=###          (Set NDOTS value)
                 +[no]edns[=###]     (Set EDNS version) [0]
                 +[no]search         (Set whether to use searchlist)
                 +[no]showsearch     (Search with intermediate results)
                 +[no]defname        (Ditto)
                 +[no]recurse        (Recursive mode)
                 +[no]ignore         (Don't revert to TCP for TC responses.)
                 +[no]fail           (Don't try next server on SERVFAIL)
                 +[no]besteffort     (Try to parse even illegal messages)
                 +[no]aaonly         (Set AA flag in query (+[no]aaflag))
                 +[no]adflag         (Set AD flag in query)
                 +[no]cdflag         (Set CD flag in query)
                 +[no]cl             (Control display of class in records)
                 +[no]cmd            (Control display of command line)
                 +[no]comments       (Control display of comment lines)
                 +[no]rrcomments     (Control display of per-record comments)
                 +[no]question       (Control display of question)
                 +[no]answer         (Control display of answer)              #控制响应输出
                 +[no]authority      (Control display of authority)
                 +[no]additional     (Control display of additional)
                 +[no]stats          (Control display of statistics)
                 +[no]short          (Disable everything except short
                                      form of answer)
                 +[no]ttlid          (Control display of ttls in records)
                 +[no]all            (Set or clear all display flags)         #是否输出所有显示标志 noall通常与answer使用
                 +[no]qr             (Print question before sending)
                 +[no]nssearch       (Search all authoritative nameservers)
                 +[no]identify       (ID responders in short answers)
                 +[no]trace          (Trace delegation down from root [+dnssec])   #DNS追踪
                 +[no]dnssec         (Request DNSSEC records)
                 +[no]nsid           (Request Name Server ID)
                 +[no]sigchase       (Chase DNSSEC signatures)
                 +trusted-key=####   (Trusted Key when chasing DNSSEC sigs)
                 +[no]topdown        (Do DNSSEC validation top down mode)
                 +[no]split=##       (Split hex/base64 fields into chunks)
                 +[no]multiline      (Print records in an expanded format)
                 +[no]onesoa         (AXFR prints only one soa record)
                 +[no]keepopen       (Keep the TCP socket open between queries)
        global d-opts and servers (before host name) affect all queries.
        local d-opts and servers (after host name) affect only that lookup.
        -h                           (print help and exit)
        -v                           (print version and exit)
</span>
</span>

命令详解

直接查询

<span style="font-size:18px;">root@kali:~# dig www.baidu.com                            #直接查询

; <<>> DiG 9.9.5-9+deb8u6-Debian <<>> www.baidu.com
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 44198        #opcode,状态,ID
;; flags: qr rd ra; QUERY: 1, ANSWER: 3, AUTHORITY: 13, ADDITIONAL: 16 #标记

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 1280                           #版本,udp:1280
;; QUESTION SECTION:
;www.baidu.com.			IN	A

;; ANSWER SECTION:
www.baidu.com.		6	IN	CNAME	www.a.shifen.com.
www.a.shifen.com.	553	IN	A	14.215.177.38
www.a.shifen.com.	553	IN	A	14.215.177.37

;; AUTHORITY SECTION:
com.			67772	IN	NS	a.gtld-servers.net.
com.			67772	IN	NS	j.gtld-servers.net.
com.			67772	IN	NS	f.gtld-servers.net.
com.			67772	IN	NS	h.gtld-servers.net.
com.			67772	IN	NS	k.gtld-servers.net.
com.			67772	IN	NS	m.gtld-servers.net.
com.			67772	IN	NS	b.gtld-servers.net.
com.			67772	IN	NS	l.gtld-servers.net.
com.			67772	IN	NS	g.gtld-servers.net.
com.			67772	IN	NS	d.gtld-servers.net.
com.			67772	IN	NS	e.gtld-servers.net.
com.			67772	IN	NS	c.gtld-servers.net.
com.			67772	IN	NS	i.gtld-servers.net.

;; ADDITIONAL SECTION:
g.gtld-servers.net.	47412	IN	A	192.42.93.30
j.gtld-servers.net.	2442	IN	A	192.48.79.30
i.gtld-servers.net.	66535	IN	A	192.43.172.30
e.gtld-servers.net.	56469	IN	A	192.12.94.30
a.gtld-servers.net.	34163	IN	A	192.5.6.30
a.gtld-servers.net.	7565	IN	AAAA	2001:503:a83e::2:30
h.gtld-servers.net.	68265	IN	A	192.54.112.30
f.gtld-servers.net.	31194	IN	A	192.35.51.30
b.gtld-servers.net.	4732	IN	A	192.33.14.30
b.gtld-servers.net.	22851	IN	AAAA	2001:503:231d::2:30
l.gtld-servers.net.	42219	IN	A	192.41.162.30
c.gtld-servers.net.	34151	IN	A	192.26.92.30
m.gtld-servers.net.	47041	IN	A	192.55.83.30
d.gtld-servers.net.	25144	IN	A	192.31.80.30
k.gtld-servers.net.	65164	IN	A	192.52.178.30

;; Query time: 84 msec
;; SERVER: 192.168.1.1#53(192.168.1.1)
;; WHEN: Tue Sep 06 15:50:49 CST 2016
;; MSG SIZE  rcvd: 589

</span>
 指定DNS域名服务器               #dig <查询子域名> <指定类型> @<指定DNS服务器ip>

dig www.baiadu.com mx @8.8.8.8

mx查询



反向查询        #dig -x <服务器IP地址>   #noall什么都不输出,answer只输出answer结果
#可能查询结果不一样,因为域名与IP地址个关系可以为一对多、多对一

DIG强大之处

1、查询DNS服务器的bing版本      #dig +noall +answer txt chaos VERSION.BID @<dns服务器即ns记录> 

∴用于查询域名下主机名的记录          ep:查询sina.com下的www.sina.com             #安全意识高的网站会把bing命令隐藏起来

###利用攻破dns服务器,获得其主机记录


2、DNS追踪             #dig +trace <域名>         #做递归查询



3、DNS区域传输   # dig @epDNS服务器 ep域名 axfr     #通俗来说是查询其备用DNS服务器

区域传送操作指的是一台后备服务器使用来自主服务器的数据刷新自己的zone数据库。这为运行中的DNS服务提供了一定的冗余度,其目的是为了防止主域名服务器因意外故障变得不可用时影响到全局。实现信息同步

###若dns区域传输配置错误,会导致任何人都可以连上DNS服务器

<span style="font-size:18px;">root@kali:~# dig @ns3.sina.com sina.com axfr

@ns3.sina.com sina.com axfr
(1 server found)
global options: +cmd</span>
<span style="font-size:18px;">connection timed out; no servers could be reached


</span>
相同作用命令:host -T -l sina.com ns3.sina.com  #-l进行asf2全区域传输

二、whois注册信息

#whois <域名>

<span style="font-size:18px;">root@kali:~# whois wooyun.org
Domain Name: WOOYUN.ORG
Domain ID: D159099935-LROR
WHOIS Server:
Referral URL: http://www.net.cn
Updated Date: 2016-01-15T00:24:32Z
Creation Date: 2010-05-06T08:50:48Z
Registry Expiry Date: 2024-05-06T08:50:48Z
Sponsoring Registrar: Hichina Zhicheng Technology Limited
Sponsoring Registrar IANA ID: 420
Domain Status: clientDeleteProhibited https://icann.org/epp#clientDeleteProhibited
Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
Registrant ID: hc556860480-cn
Registrant Name: Fang Xiao Dun
Registrant Organization: Fang Xiao Dun
Registrant Street: Haidian District JuYuan Road 6# 502
Registrant City: Beijing
Registrant State/Province: Beijing
Registrant Postal Code: 100080
Registrant Country: CN
Registrant Phone: +86.18610137578
Registrant Phone Ext:
Registrant Fax: +86.18610137578
Registrant Fax Ext:
Registrant Email: xssshell@gmail.com
Admin ID: HC-009652962-CN
Admin Name: Fang Xiaodun
Admin Organization: Beijing Bigfish Technology
Admin Street: Haidian District JuYuan Road 6# 502
Admin City: Beijing
Admin State/Province: Beijing
Admin Postal Code: 100080
Admin Country: CN
Admin Phone: +86.18610137578
Admin Phone Ext:
Admin Fax: +86.18610137578
Admin Fax Ext:
Admin Email: xssshell@gmail.com
Tech ID: HC-844637505-CN
Tech Name: Fang Xiaodun
Tech Organization: Beijing Bigfish Technology
Tech Street: Haidian District JuYuan Road 6# 502
Tech City: Beijing
Tech State/Province: Beijing
Tech Postal Code: 100080
Tech Country: CN
Tech Phone: +86.18610137578
Tech Phone Ext:
Tech Fax: +86.18610137578
Tech Fax Ext:
Tech Email: xssshell@gmail.com
Name Server: NS1.DNSV2.COM
Name Server: NS2.DNSV2.COM
DNSSEC: unsigned
>>> Last update of WHOIS database: 2016-09-02T21:50:05Z <<<

For more information on Whois status codes, please visit https://icann.org/epp

Access to Public Interest Registry WHOIS information is provided to assist persons in determining the contents of a domain name registration record in the Public Interest Registry registry database. The data in this record is provided by Public Interest Registry for informational purposes only, and Public Interest Registry does not guarantee its accuracy. This service is intended only for query-based access. You agree that you will use this data only for lawful purposes and that, under no circumstances will you use this data to(a) allow, enable, or otherwise support the transmission by e-mail, telephone, or facsimile of mass unsolicited, commercial advertising or solicitations to entities other than the data recipient's own existing customers; or (b) enable high volume, automated, electronic processes that send queries or data to the systems of Registry Operator, a Registrar, or Afilias except as reasonably necessary to register domain names or modify existing registrations. All rights reserved. Public Interest Registry reserves the right to modify these terms at any time. By submitting this query, you agree to abide by this policy.

</span>


whios网站提供图形化但结果可能不尽人意

三、DNSenum

dnsenum的目的是尽可能收集一个域的信息,它能够通过谷歌或者字典文件猜测可能存在的域名,以及对一个网段进行反向查询。它可以查询网站的主机地址信息、域名服务器、mx record(函件交换记录),在域名服务器上执行axfr请求,通过谷歌脚本得到扩展域名信息(google hacking),提取自域名并查询,计算C类地址并执行whois查询,执行反向查询,把地址段写入文件。

常用用法:


<span style="font-size:24px;">root@kali:~# dnsenum -enum baidu.com
dnsenum.pl VERSION:1.2.3
Warning: can't load Net::Whois::IP module, whois queries disabled.

-----   baidu.com   -----


Host's addresses:
__________________

baidu.com.                               346      IN    A        220.181.57.217
baidu.com.                               346      IN    A        111.13.101.208
baidu.com.                               346      IN    A        123.125.114.144
baidu.com.                               346      IN    A        180.149.132.47


Name Servers:
______________

ns2.baidu.com.                           76012    IN    A        61.135.165.235
ns4.baidu.com.                           25326    IN    A        220.181.38.10
ns3.baidu.com.                           38813    IN    A        220.181.37.10
ns7.baidu.com.                           78929    IN    A        119.75.219.82
dns.baidu.com.                           35202    IN    A        202.108.22.220


Mail (MX) Servers:
___________________

mx1.baidu.com.                           600      IN    A        61.135.163.61
jpmx.baidu.com.                          2599     IN    A        61.208.132.13
mx50.baidu.com.                          600      IN    A        61.135.163.61
mx.n.shifen.com.                         600      IN    A        220.181.3.77


Trying Zone Transfers and getting Bind Versions:
_________________________________________________


Trying Zone Transfer for baidu.com on ns4.baidu.com ... </span>

</span>


常用参数
--threads [number]设置用户可同时运行的进程
-r允许递归查询
-d设置WHOIS请求之间的时间延迟数(s)
-o指定输出位置
-w启用WHOIS请求

四、fierce

fierce工具主要是对子域名进行扫描和收集信息。使用fierce工具获得一个目标主机上所有IP地址和主机信息。

<span style="font-size:18px;">root@kali:~# fierce -dns baidu.com
DNS Servers for baidu.com:
	ns4.baidu.com
	ns2.baidu.com
	ns3.baidu.com
	ns7.baidu.com
	dns.baidu.com

Trying zone transfer first...
	Testing ns4.baidu.com
		Request timed out or transfer not allowed.
	Testing ns2.baidu.com
		Request timed out or transfer not allowed.
	Testing ns3.baidu.com
		Request timed out or transfer not allowed.
	Testing ns7.baidu.com
		Request timed out or transfer not allowed.
	Testing dns.baidu.com
		Request timed out or transfer not allowed.

Unsuccessful in zone transfer (it was worth a shot)
Okay, trying the good old fashioned way... brute force

Checking for wildcard DNS...
Nope. Good.
Now performing 2280 test(s)...
10.94.49.39	access.baidu.com
10.11.252.74	accounts.baidu.com
10.26.109.19	admin.baidu.com
10.42.4.225	ads.baidu.com
172.22.15.17	agent.baidu.com
172.22.15.16	agent.baidu.com
10.57.8.26	alpha.baidu.com

</span>
<span style="font-size:18px;">…………………………………………</span>

  • 字典爆破   #若DNS服务器不允许进行区域传输  #kali2.0不自带dnsdict

fierce -dnsserver 8.8.8.8 -dns sina.com.cn -wordlist a.txt

###ep:查找字典

dpkg -L fierce

dnsdict6 -d4 -t 16 -x sina.com    #-t:线程数 #-d:显示IPv6地址和mx、ns #-d4:IPv4 #指定字典大小[-l/m/x/u]

#dnsdict6:速度快,字典大、全、精准

dnsenum -f dnsbig.txt -dnsserver 8.8.8.8 sina.com -o sina.xml
dnsmap sina.com -w dns.txt
dnsrecon -d sina.com --lifetime 10 -t brt -D dnsbig.txt

dnsrecon -t std -d sina.com


可靠参考点击打开链接

小白日记,未完待续……
  • 3
    点赞
  • 16
    收藏
    觉得还不错? 一键收藏
  • 0
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值