Podcast
Questions and Answers
What is the function of the command 'dnsrecon -D'?
What is the function of the command 'dnsrecon -D'?
Which of the following statements about 'nslookup' is true?
Which of the following statements about 'nslookup' is true?
What is the primary advantage of using 'dig' over 'nslookup'?
What is the primary advantage of using 'dig' over 'nslookup'?
Which script is used with Nmap for discovering CNAMEs?
Which script is used with Nmap for discovering CNAMEs?
Signup and view all the answers
What is the default port number for Burp Suite?
What is the default port number for Burp Suite?
Signup and view all the answers
Which of the following is a benefit of using OWASP ZAP?
Which of the following is a benefit of using OWASP ZAP?
Signup and view all the answers
In Metasploit, which module is used for DNS brute forcing?
In Metasploit, which module is used for DNS brute forcing?
Signup and view all the answers
What does the command 'dig @ nameserver version.bind chaos txt' do?
What does the command 'dig @ nameserver version.bind chaos txt' do?
Signup and view all the answers
What is the default username and password used for logging into the provided virtual image?
What is the default username and password used for logging into the provided virtual image?
Signup and view all the answers
Which of the following tools is NOT included in the lab setup?
Which of the following tools is NOT included in the lab setup?
Signup and view all the answers
Which command-line tool is used to perform WHOIS lookups?
Which command-line tool is used to perform WHOIS lookups?
Signup and view all the answers
What TCP port is used for WHOIS queries?
What TCP port is used for WHOIS queries?
Signup and view all the answers
What is the purpose of a DNS Zone Transfer?
What is the purpose of a DNS Zone Transfer?
Signup and view all the answers
What should be done when performing large DNS brute force scans?
What should be done when performing large DNS brute force scans?
Signup and view all the answers
Which of the following is a reconnaissance tool included in the lab setup?
Which of the following is a reconnaissance tool included in the lab setup?
Signup and view all the answers
What is the root password for MySQL in the provided virtual image setup?
What is the root password for MySQL in the provided virtual image setup?
Signup and view all the answers
Which web browsers are available in the lab setup?
Which web browsers are available in the lab setup?
Signup and view all the answers
What are the types of DNS Zone Transfers mentioned?
What are the types of DNS Zone Transfers mentioned?
Signup and view all the answers
Study Notes
Lab Setup
-
Virtual Image: Students will receive a virtual image file called
cybrKali.ova
. - Import: Use VirtualBox or VMWare to import the file.
- Kali: Alternatively, students can use Kali directly.
Log In
-
Username:
student
-
Password:
cybr
(case sensitive) -
Root Access: Use
sudo
with the same password for root access.
Included Tools
- Operating System: Kali, 64-bit
- Web Server: Apache HTTP Server
-
Database: MySQL (root password:
mutillidae
) - Programming Language: PHP
- Java: Java Runtime Environment (JRE)
- Web Browsers: Firefox and Chromium
-
Reconnaissance Tools:
-
whois
,dig
,nslookup
-
Nmap
(Zenmap) -
DNSRecon
-
Metasploit
-
Netcat
(nc) -
curl
-
Nikto
-
Wireshark
-
sqlmap
-
-
Interception Proxies:
- Burp Suite (default port 8080)
- OWASP Zed Attack Proxy (ZAP) (default port 8082)
Targets
- Mutillidae: A vulnerable web application designed for penetration testing training.
-
Altoro Mutual: Use the provided credentials (
jsmith
,Demo1234
) to access the web application. -
Zero Bank: Use the provided credentials (
username
,password
) to access the web application.
WHOIS
- Protocol: TCP port 43
- Stealth: Helps with reconnaissance.
-
Output:
- Name(s) and phone number(s)
- Physical address
- DNS server (Names and IP addresses)
- Public netblocks
- Helpful Use: Iterating Whois/DNS lookups can be beneficial.
Domain Name System (DNS)
- Database: A hierarchical database of domain names.
- Protocol: UDP port 53 with a payload size of 512 bytes, particularly for zone transfers.
- Information: Provides various information valuable for virtual host discovery during penetration tests.
DNS Zone Transfer
- Functionality: Allows secondary DNS servers to mirror data from a primary server.
- Security: Ideally, zone transfer should be restricted.
-
Exceptions:
- ISPs managing DNS for customers.
- Internal DNS servers permitting zone transfers within internal networks.
-
Types:
-
AXFR
: Full transfer. -
IXFR
: Incremental transfer.
-
When Zone Transfers Are Unavailable
-
Reverse DNS (PTR) Scans:
- Many DNS administrators create reverse (PTR) records for every A record.
- Perform a whois lookup for IP addresses, then perform a reverse DNS lookup for each IP.
-
DNS Brute Force Scans:
- Discover names, virtual hosts, and CNAMEs.
- Utilize a dictionary of potential DNS names and attempt to resolve entries.
- Useful for virtual host discovery.
- Seek permission before performing comprehensive brute force scans.
DNSRecon
- Function: A tool by Carlos Perez (@darkoperator) for various DNS reconnaissance tasks.
-
Location:
/usr/share/dnsrecon
in the VM. -
Basic Usage:
dnsrecon -d <domain>
-
Options:
-
-n
: Perform a brute force domain scan. -
-r
: Perform a reverse DNS scan. -
-D
: Use included dictionaries (wordlists) for brute force scans.
-
-
Wordlist:
/usr/share/dnsrecon/namelist.txt
(contains 1,909 entries)
nslookup
-
Pros:
- Widely available.
- Often installed on compromised hosts.
- Useful for confirming blind command injection (outbound DNS may be unfiltered).
-
Cons:
- Limited functionality compared to
dig
. - Reduced functionality in newer versions.
- Limited functionality compared to
dig
- Functionality: A comprehensive DNS client.
- Availability: Native on OS X and most UNIX/Linux distributions.
- Included: In the BIND (Berkeley Internet Name Domain) DNS server package.
-
Usage:
dig @example.com options…
-
Options:
-
-t any
: Query all record types. -
-t ns
: Query for name server records. -
-x
: Perform a reverse DNS lookup (PTR records). -
-t axfr
: Attempt a zone transfer. -
dig @nameserver version.bind chaos txt
: Query the nameserver’s BIND version.
-
Nmap DNS NSE Scripts
- Nmap NSE Scripts: Nmap includes several DNS-oriented NSE (Nmap Scripting Engine) scripts.
-
Functionality:
- Some replicate
dig
functionality, includingdns-zone-transfer.nse
. -
dns-brute.nse
helps discover CNAMEs.
- Some replicate
-
Location:
/usr/share/nmap/scripts/dns*
Metasploit
- Popularity: A widely used exploitation framework.
- Web Testing: Offers substantial web testing capabilities, especially for off-the-shelf software.
- Exploits: Includes exploits for common platforms like Wordpress, Joomla, Drupal, Oracle DB, and SQL Server.
-
DNS Information Gathering:
- Modules located in
/opt/metasploit-framework/embedded/framework/modules/post/multi/gather
:-
dns_bruteforce
. -
dns_reverse_lookup
. -
dns_srv_lookup
.
-
- Modules located in
Burp Suite
-
Default Port: 8080 (can be changed in
Proxy->Options
). -
Versions:
- Older version available as a desktop shortcut (includes scan functionality).
- Newer version in favorites (lacks scan function).
OWASP Zed Attack Proxy (ZAP)
- Functionality: A comprehensive open-source interception proxy.
-
Access: Available via desktop shortcut, Favorites, or command line (
zap.sh
). -
Port Number: Set in
Tools->Options->Local Proxies->Port
(default 8082). - Certificate Setup: ZAP's CA certificate can be configured in Firefox.
-
Documentation:
OWASP ZAP Desktop User Guide
athttps://www.zaproxy.org/docs/desktop/
.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
This quiz covers the setup and tools required for a cybersecurity lab using Kali Linux. Students will learn how to import a virtual image, log in, and utilize various reconnaissance and interception tools effectively. The focus is on practical skills essential for cybersecurity training.