πDNS Attacks
π― Overview
ποΈ DNS Attack Methodology
Attack Chain Overview
Service Discovery β Zone Transfer Exploitation β Subdomain Enumeration β Domain Takeover β DNS SpoofingKey Attack Objectives
π Service Discovery & Enumeration
Default DNS Port Detection
Comprehensive DNS Scanning
Key Information to Extract
ποΈ DNS Zone Transfer Attacks
Understanding Zone Transfers
HTB Academy Zone Transfer Example
Using DIG for AXFR
Alternative Zone Transfer Methods
Fierce for Comprehensive DNS Analysis
π Subdomain Enumeration & Domain Takeover
Subdomain Discovery Techniques
HTB Academy Subfinder Example
Subbrute for Internal Networks
Domain Takeover Attacks
Understanding Subdomain Takeover
HTB Academy Takeover Example
Subdomain Takeover Detection Tools
π·οΈ DNS Spoofing & Cache Poisoning
Understanding DNS Cache Poisoning
HTB Academy Ettercap DNS Spoofing
Step 1: Configure DNS Spoofing
Step 2: Execute MITM Attack
Step 3: Verify DNS Spoofing
Alternative DNS Spoofing Tools
π― HTB Academy Lab Scenarios
Scenario 1: DNS Zone Transfer Exploitation
HTB Academy Solution Workflow
Alternative Methods
Advanced DNS Reconnaissance
π DNS Attack Checklist
Discovery & Enumeration
Information Gathering
Exploitation Techniques
Post-Exploitation
π‘οΈ Defense & Mitigation
DNS Server Hardening
Network Security
Monitoring & Detection
π Related Techniques
π References
Last updated