Learn why the Domain Name System is essential, yet has many threats. Learn about the different types of DNS queries. Discover how to map a network using DNS footprinting tools in order to find out information that is managed by the authoritative server for your namespace (the SOA).
- [Instructor] When conducting reconnaissance,…using the domain name system…will help map your target's network.…Domain name system is an application layer protocol…that converts hostnames to an IP address and vice versa.…DNS uses port 53 over UDP or TCP.…In general, DNS uses UDP or User Datagram Protocol.…Remember, that's a connectionless protocol,…and in general we want a DNS request fast.…TCP is only used for a zone transfer.…
The DNS hierarchy is in a tree-like structure…and is made of servers spread all around the world.…DNS is the largest distributed database in the world,…and as we can see, the structure begins with the root.…Below that, we see the top level parent,…such as .com, .edu, .net,…and then the second level child off of that,…google.com, mit.edu, or patra.net.…There are a number of different types of DNS records,…but let's just take a look at four common ones…that you'll probably see.…
Type A maps a hostname…to a 32-bit IP version four address of the host.…A quad A maps a hostname…to a 128-bit IP version six address of the host.…
Note: Our Ethical Hacking series maps to the 18 parts of the EC-Council's certification exam. This course maps to the 02 Footprinting and Reconnaissance domain.
- Using competitive intelligence
- Hacking with search engines
- Using email for footprinting
- Getting social
- Mirroring websites
- Using Ping, Tracert, nslookup, and dig
- Taking footprinting countermeasures
- Pen testing for footprinting