Completed
Goals
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
DNS Reconnaissance Techniques - Derbycon 2012
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Disclaimer
- 3 What is Recon
- 4 Why DNS
- 5 Caveats of DNS • DNS is UDP so it is sensitive to the health of the connection path from the attacker to the
- 6 DNSRecon
- 7 Goals
- 8 Types of Enumeration
- 9 Standard Enumeration
- 10 Zone Transfer
- 11 Reverse Lookup
- 12 Domain Brute-force
- 13 Cache Snooping
- 14 NSEC Zone Walk
- 15 SRV RR Leakage
- 16 A RR Leakage
- 17 Parsing Data
- 18 Importing Data in to Metasploit