DNS Reconnaissance Techniques - Derbycon 2012

DNS Reconnaissance Techniques - Derbycon 2012

via YouTube Direct link

A RR Leakage

16 of 18

16 of 18

A RR Leakage

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

DNS Reconnaissance Techniques - Derbycon 2012

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Disclaimer
  3. 3 What is Recon
  4. 4 Why DNS
  5. 5 Caveats of DNS • DNS is UDP so it is sensitive to the health of the connection path from the attacker to the
  6. 6 DNSRecon
  7. 7 Goals
  8. 8 Types of Enumeration
  9. 9 Standard Enumeration
  10. 10 Zone Transfer
  11. 11 Reverse Lookup
  12. 12 Domain Brute-force
  13. 13 Cache Snooping
  14. 14 NSEC Zone Walk
  15. 15 SRV RR Leakage
  16. 16 A RR Leakage
  17. 17 Parsing Data
  18. 18 Importing Data in to Metasploit

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.