DNS Security - Tip #1

DNS Security






Sometimes DNS misconfigured insecurely and anyone can use this vulnerability to gathering information "Reconnaissance" for target attack even if it's an obsolete approach but it's still useful :( . The vulnerability in Zone transfer in Windows DNS which is enabled feature "allowing Zone transfer" from untrusted sources by this way you will allow anyone to obtains all Zone information about your organization such Network scheme, Server and services names...etc 

Applying below commands will get all DNS zone information if the feature "allow zone transfer to any servers" is enabled in your DNS server.


>nslookup
> server <DNS Server> 
> set type=any (to get all types of DNS records)
> ls -d <Zone Name> > InfoZone.txt (the actual transfer)

Make sure to restrict zone transfers feature in Windows environment to be allowed only from a trusted source as follows:

  • Open DNS Manager.
  • Right Click on Zone "Domain name" under "Forward lookup zone". 
  • Zone Transfers.
  • Select "Only to servers listed on the name servers tap"

DNS zone transfers are using port TCP 53 and Clients are using UDP 53 for queries.


You can run below command to determine all foreign IPs communicating with DNS server on port 53.

      Netstat  -o  |find "53"  |find "TCP"


Regards,

Comments

Popular posts from this blog

How to Configure Azure MFA with Exchange Server 2013 and ADFS 2012 R2

How to exclude certain users from MFA in ADFS 3.0