Re: Detecting DNS Servers

From: Jim (ps2manat_private)
Date: Fri Jul 11 2003 - 22:47:48 PDT

  • Next message: Pete Herzog: "RE: Detecting DNS Servers"

    Alot of dns severs specifiy they are dns servers in there host names also..
    
    
    ----- Original Message -----
    From: "Michael Thumann" <mlthumann@ids-guide.de>
    To: "Rodrigo Ramos" <rodrigo.ramosat_private>
    Cc: <pen-testat_private>
    Sent: Saturday, July 12, 2003 4:56 AM
    Subject: Re: Detecting DNS Servers
    
    
    > Hi Rodrigo,
    >
    > Mike has published example code for that. you can find it at
    > www.wiley.com/compbooks/schiffman
    >
    > Look for sift.
    >
    > Hope that helps
    > Michael
    >
    > At 15:16 11.07.2003 -0300, Rodrigo Ramos wrote:
    > >Hi Michael,
    > >
    > >I haven't read this book.
    > >Cold you give me an example? Would I need a packet builder?
    > >
    > >
    > >Best regards,
    > >Rodrigo Ramos
    > >
    > >On Fri, 2003-07-11 at 14:12, Michael Thumann wrote:
    > > > Mike Schiffman explained  one way in his book 'Building Open Source
    > > Network
    > > > Security Tools' . Some DNS Servers will send a version string back, if
    you
    > > > send them a chaos class query, especially BIND servers support that
    and
    > > are
    > > > configured to do so by default.
    > > >
    > > > cheers
    > > > Michael
    > > >
    > > > At 10:22 11.07.2003 -0300, you wrote:
    > > > >Hi,
    > > > >
    > > > >
    > > > >I need a help from the community.
    > > > >At this moment I am reading papers from NIST and ISECOM (osstmm2.0).
    > > > >I need to know the very best way to discover the versions of DNS
    > > > >servers.
    > > > >I need to write a paper about it.I all ready wrote something, but I
    need
    > > > >to hear from everybody.
    > > > >
    > > > >
    > > > >
    > > > >Best Regards,
    > > > >Rodrigo Ramos
    > > > >http://www.spytket.com.br
    > > > >
    > > > >
    > > > >
    > > >
    >-----------------------------------------------------------------------
    > > ----
    > > > >The Lightning Console aggregates IDS events, correlates them with
    > > > >vulnerability info, reduces false positives with the click of a
    button,
    > > > >anddistributes this information to hundreds of users.
    > > > >
    > > > >Visit Tenable Network Security at http://www.tenablesecurity.com to
    learn
    > > > >more.
    > > >
    >-----------------------------------------------------------------------
    > > -----
    > > >
    > > >
    >
    > --------------------------------------------------------------------------
    --------------------------
    > > > Michael Thumann        mlthumann@ids-guide       www.ids-guide.de
    > > > Public Key available at http://www.ids-guide.de/MichaelThumann.asc
    > > >
    >
    > --------------------------------------------------------------------------
    --------------------------
    > > > The only secure computer is one that's unplugged, locked in a safe,
    > > > and buried 20 feet under the ground in a secret location...and i'm not
    > > > even too sure about that one
    > > >
    > > --Dennis
    > > > Huges, FBI.
    > > >
    > > >
    > >
    > --------------------------------------------------------------------------
    -
    > > > The Lightning Console aggregates IDS events, correlates them with
    > > > vulnerability info, reduces false positives with the click of a
    button,
    > > anddistributes this information to hundreds of users.
    > > >
    > > > Visit Tenable Network Security at http://www.tenablesecurity.com to
    learn
    > > > more.
    > > >
    >
    > --------------------------------------------------------------------------
    --
    > > >
    > > >
    >
    > --------------------------------------------------------------------------
    --------------------------
    > Michael Thumann        mlthumann@ids-guide       www.ids-guide.de
    > Public Key available at http://www.ids-guide.de/MichaelThumann.asc
    > --------------------------------------------------------------------------
    --------------------------
    > The only secure computer is one that's unplugged, locked in a safe,
    > and buried 20 feet under the ground in a secret location...and i'm not
    > even too sure about that one
    >                                                                     --Denn
    is
    > Huges, FBI.
    >
    >
    > --------------------------------------------------------------------------
    -
    > The Lightning Console aggregates IDS events, correlates them with
    > vulnerability info, reduces false positives with the click of a button,
    anddistributes this information to hundreds of users.
    >
    > Visit Tenable Network Security at http://www.tenablesecurity.com to learn
    > more.
    > --------------------------------------------------------------------------
    --
    >
    >
    
    
    ---------------------------------------------------------------------------
    The Lightning Console aggregates IDS events, correlates them with 
    vulnerability info, reduces false positives with the click of a button, anddistributes this information to hundreds of users.
    
    Visit Tenable Network Security at http://www.tenablesecurity.com to learn 
    more.
    ----------------------------------------------------------------------------
    



    This archive was generated by hypermail 2b30 : Sun Jul 13 2003 - 07:55:58 PDT