Understand that the DNS system is essential, yet has many threats. Learn about the different types of Domain Name System (DNS) Queries. Lisa Bock illustrates how to Map a network using DNS footprinting tools in order to find out information that is managed by the authoritative server for your namespace (the SOA).
- [Voiceover] When conducting reconnaissance…using the Domain Name System will help…map your targets network.…Domain Name System is an application…layer protocol that converts host names…to an IP address and vice versa.…DNS uses port 53 over UDP or TCP.…In general, DNS uses UDP or user datagram protocol.…Remember that's a connectionless protocol…and in general, we want a DNS request fast.…TCP is only used for a zone transfer.…
The DNS hierarchy is in a tree-like structure…and is made of servers spread all around the world.…DNS is the largest distributed database in the world…and as we can see the structure begins with the root.…Below that we see the top level parent…such as .com, .edu, .net…and then the second level child…off of that GOOGLE.COM, MIT.EDU, or PATRA.NET…there are a number of different types of DNS records…but lets just take a look at four common ones…that you'll probably see.…
Type A maps a host name to a 32-bit IPv4 address of the host…AAAA maps a host name to a 128-bit IPv6 address of the host…a PTR is most commonly used for implementing…
Note: Our Ethical Hacking series maps to the 18 parts of the EC-Council's certification exam. This course maps to the 02 Footprinting and Reconnaissance domain.
- Using competitive intelligence
- Hacking with search engines
- Using email for footprinting
- Getting social
- Mirroring websites
- Using Ping, Tracert, nslookup, and dig
- Taking footprinting countermeasures
- Pen testing for footprinting