Penetration Testing with Kali Linux
PWK - Copyright © 2023 OffSec Services Limited. All rights reserved.
136
[*] MX fb.mail.gandi.net 217.70.178.216
[*] MX fb.mail.gandi.net 217.70.178.215
[*] MX mail2.megacorpone.com 51.222.169.213
[*] TXT megacorpone.com
Try Harder
[*] TXT megacorpone.com
google-site-
verification=U7B_b0HNeBtY4qYGQZNsEYXfCJ32hMNV3GtC0wWq5pA
[*]
Enumerating SRV Records
[+] 0
Records Found
Listing 46 - Using dnsrecon to perform a standard scan
Based on the output above, we have managed to perform a successful DNS scan on the main
record types against the megacorpone.com domain.
Let’s try to brute force additional hostnames using the list.txt file
we created previously for
forward lookups.
kali@kali:~$
cat list.txt
www
ftp
mail
owa
proxy
router
Listing 47 - List to be used for subdomain brute forcing using dnsrecon
To perform
our brute force attempt, we will use the -d option
to specify a domain name, -D to
specify a file name containing
potential subdomain strings, and
-t to specify the type of
enumeration to perform, in this case brt for brute force.
kali@kali:~$
Yüklə
Dostları ilə paylaş: