DNS Security - Tip #1
DNS Security
Sometimes DNS misconfigured insecurely and anyone can use this vulnerability to gathering information "Reconnaissance" for target attack even if it's an obsolete approach but it's still useful :( . The vulnerability in Zone transfer in Windows DNS which is enabled feature "allowing Zone transfer" from untrusted sources by this way you will allow anyone to obtains all Zone information about your organization such Network scheme, Server and services names...etc
Applying below commands will get all DNS zone information if the feature "allow zone transfer to any servers" is enabled in your DNS server.
>nslookup> server <DNS Server> > set type=any (to get all types of DNS records)> ls -d <Zone Name> > InfoZone.txt (the actual transfer)
Make sure to restrict zone transfers feature in Windows environment to be allowed only from a trusted source as follows:
- Open DNS Manager.
- Right Click on Zone "Domain name" under "Forward lookup zone".
- Zone Transfers.
- Select "Only to servers listed on the name servers tap"
DNS zone transfers are using port TCP 53 and Clients are using UDP 53 for queries.
You can run below command to determine all foreign IPs communicating with DNS server on port 53.
Netstat -o |find "53" |find "TCP"
Regards,

Comments
Post a Comment