Dns check vulnerabilité
De BlaxWiki
Aller à la navigationAller à la rechercheCette commande permet de vérifier que le serveur dns réponde bien sur différents ports, il doit retourner un great.
dig @serveurdns blaxeen.com porttest.dns-oarc.net TXT
benj@blaxeen :~$dig @ns0.fr.clara.net blaxeen.com porttest.dns-oarc.net TXT ; <<>> DiG 9.5.1-P2 <<>> @ns0.fr.clara.net blaxeen.com porttest.dns-oarc.net TXT ; (1 server found) ;; global options: printcmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 42762 ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 2, ADDITIONAL: 2 ;; QUESTION SECTION: ;blaxeen.com. IN A ;; ANSWER SECTION: blaxeen.com. 90000 IN A 212.43.241.106 ;; AUTHORITY SECTION: blaxeen.com. 90000 IN NS ns3.fr.clara.net. blaxeen.com. 90000 IN NS ns4.fr.clara.net. ;; ADDITIONAL SECTION: ns3.fr.clara.net. 86400 IN A 212.43.194.83 ns4.fr.clara.net. 86400 IN A 80.168.69.10 ;; Query time: 194 msec ;; SERVER: 212.43.194.2#53(212.43.194.2) ;; WHEN: Thu Apr 2 12:02:55 2009 ;; MSG SIZE rcvd: 125 ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 15478 ;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 1, ADDITIONAL: 1 ;; QUESTION SECTION: ;porttest.dns-oarc.net. IN TXT ;; ANSWER SECTION: porttest.dns-oarc.net. 60 IN CNAME porttest.y.x.w.v.u.t.s.r.q.p.o.n.m.l.k.j.i.h.g.f.e.d.c.b.a.pt.dns-oarc.net. porttest.y.x.w.v.u.t.s.r.q.p.o.n.m.l.k.j.i.h.g.f.e.d.c.b.a.pt.dns-oarc.net. 60 IN TXT "212.43.194.2 is GREAT: 26 queries in 4.4 seconds from 26 ports with std dev 18802" ;; AUTHORITY SECTION: y.x.w.v.u.t.s.r.q.p.o.n.m.l.k.j.i.h.g.f.e.d.c.b.a.pt.dns-oarc.net. 60 IN NS ns.y.x.w.v.u.t.s.r.q.p.o.n.m.l.k.j.i.h.g.f.e.d.c.b.a.pt.dns-oarc.net. ;; ADDITIONAL SECTION: ns.y.x.w.v.u.t.s.r.q.p.o.n.m.l.k.j.i.h.g.f.e.d.c.b.a.pt.dns-oarc.net. 60 IN A 149.20.58.125 ;; Query time: 4946 msec ;; SERVER: 212.43.194.2#53(212.43.194.2) ;; WHEN: Thu Apr 2 12:03:00 2009 ;; MSG SIZE rcvd: 242