Posts

Showing posts with the label DNS

DNS Hijacking: What is it and How it Work

Image
By Parth DNS hijacking  (sometimes referred to as  DNS redirection ) is a type of malicious attack that overrides a computer’s TCP/IP settings to point it at a rogue DNS server, thereby invalidating the default DNS settings. In other words, when an attacker takes control of a computer to alter its DNS settings, so that it now points to a rogue DNS server, the process is referred to as  DNS hijacking . As we all know, the “Domain Name System (DNS)” is mainly responsible for translating a user friendly domain name such as “google.com” to its corresponding IP address “74.125.235.46”. Having a clear idea of DNS and its working can help you better understand what  DNS hijacking  is all about. If you are fairly new to the concept of DNS, I would recommend reading my previous post on  How Domain Name System Works . How DNS Hijacking Works? As mentioned before, DNS is the one that is responsible for mapping the user friendly domain names to their c...

DNS Enumeration with Kali Linux Tutorial

Image
By Parth Makadiya When it comes to web server’s penetration-testing, a  DNS server  is always on the top of  the list  because DNS server is the core gateway of an  internal  enterprise to the mighty internet. Information gathering, as  we all know  is an important part of Penetration, so gathering information about the DNS is just as important as the DNS server. Even if an attacker can enumerate a DNS server it can prove very lethal to the Organization whose information is stored on the server. In this tutorial we will be looking at several tools and their usage by which we can enumerate a DNS server in several ways. For this we will open CMD shell in BT and type  cd /pentest/enumeration/dns Then type  ls  The list of DNS enumeration tools will appear and we will  take a look  at the use of all tools. First we will use dnsenum tool. It is very easy to use this tool, just type the command in the format...

Edit Host Files in Windows 8 and Linux

Image
By Parth Makadiya Host file is used to bypass the DNS and connect to the Internet based on the user defined rules. If you want to have your own set of rules and bypass the DNS then you need to edit the host file. Editing hosting file is little different from editing the normal file because, Editing the host file needs administrator privileges in operating system. Here in this post you learn how you can edit the host file easily in Windows and Linux. Ed iting Host file in Windows 8 [Without Tool / Traditional way] As to edit the Host file we need to run the text editor with Administrator privileges. You can use any text editor like notepad, notepad++,wordpad or any other your favorite text editor (Don’t forget to share with us) to edit the host all you need is just to run your text editor application with Administrator privileges. Running the applications with Administrator privileges on  Windows 8  is so easy.There are multiple ways to run an application with admi...