本帖最后由 aber02zzl 于 2011-4-20 20:57 编辑
0 r( j& z( Q- \7 _# n# K [; l3 j; y) I. t
DNSmap的BT官方教程,简单翻译了下。 http://www.backtrack-linux.org/forums/old-tutorials-guides/9421-dnsmap-tutorial.html?langid=8 DNSMap Tutorial
8 Z9 S6 a7 [$ c( }0 H% DThis tutorial will show you how to use DNSMap 这个教程告诉你如何使用DNSmap。
7 b" c7 M) n2 D) S7 c8 |( KDisclaimer: This is for educational purposes only not for committing a crime you are on your own! 声明:这篇文章仅用于教学,请不要用于犯罪啊! All IP's have been changed. 所有的IP地址都更改过了。
3 k6 y% I# n3 i& _7 U' aBackground: Dnsmap is a small C based tool that perform brute-forcing of domains. The tool can use an internal wordlist, or work with an external dictionary file. Info: http://ikwt.dyndns.org/ Thissite seems to be down.
6 T' L a: ^ u' G) l/ O% t4 q# z6 S(Source http://backtrack.offensive-security....p/Tools#dnsmap ) 背景知识:DNSmap是一个基于c的小工具,主要用于暴力获取域名。该工具可以使用内在字符串或者外在字典。
5 A' w f# p- x; G" tOk now to acccess the tool go to Menu | Backtrack | InformationGathering | DNS| DNSMap 按照上面的发放在BT4中打开
4 j; d1 ~2 _' L4 n! }Ok it will open a shell and show you 代码: dnsmap - DNS Network Mapper by pagvac (http://ikwt.com, http://foro.elhacker.net) Usage: dnsmap <target-domain>[dictionary-file] Examples: dnsmap yourtarget.com dnsmap yourtarget.com yourwordlist.txt bt dnsmap # % \6 q% m @2 w! f7 R. S' w7 I# [
Once you have it open you can check the readme by doing a nano README This will provide lotsmore info.
; B }5 \2 J6 c" R! ^Be sure to read it there are some limitations when using this tool. 你可以使用nano来查看readme文件获取更多信息并了解相关限制。
: \" p. ?& y9 d9 G9 W: NNext we need to give dnsmap a target to search again we will use http://www.victimluser.com
% ? p( T* u* f v# B: s+ cso 下面以http://www.victimluser.com 示范软件用法 代码: bt dnsmap # victimluser.com
7 ~7 c# |; g. l" R3 e) _This will return us with: 结果如下: 代码: dnsmap - DNS Network Mapper by pagvac (http://ikwt.com, http://foro.elhacker.net) Searching subhosts on domainvictimluser.com forum.victimluser.com IP Address #1:192.168.1.1 mail.victimluser.com IP Address #1:192.168.1.2 ftp.victimluser.com IP Address #1:192.168.1.3 pop.victimluser.org IP Address #1:192.168.1.4
1 u4 w3 \( t! B2 X* ~Also you can createa wordlist.txt that you can supply at the command line like this 你也可以使用字符串,用法如下: 代码: 7 R; Y, x6 f: L+ E- {: N j
bt dnsmap # dnsmap targetdomain.com wordlist.txt
$ P) G' L: G" v1 i' I4 A3 h1 Y- aThis will force dnsmap to use a supplied wordlist to bruteforce subdomains if you do not supply a wordlist then dnsmap! j& F' K7 k. P2 R( q9 D# \$ |
will use the built in one by default. 这回强制DNSmap使用你提供的字符串,否则则使用内置的字符串。0 V$ ~! a+ x( b) }
The readme also give links to a few wordlist you can download.
+ E2 k r% Z6 K% i" P( AHave fun using this tool! ) H! g5 f* w) m+ V( |
PS:附上DnSmap的官方介绍 0 D# g- d1 j: O! \
dnsmap was originally released back in 2006 and was inspired by the fictional story "The Thief No One Saw" by Paul Craig, which can be found in the book "Stealing the Network - How to 0wn the Box".dnsmap is mainly meant to be used by pentesters during the information gathering/enumeration phase of infrastructure security assessments. During the enumeration stage, the security consultant would typically discover the target company's IP netblocks, domain names, phone numbers, etc ...Subdomain brute-forcing is another technique that should be used in the enumeration stage, as it's especially useful when other domain enumeration techniques such as zone transfers don't work (I rarely see zone transfers being publicly allowed these days by the way).If you are interested in researching stealth computer intrusion techniques, I suggest reading this excellent (and fun) chapter which you can find for free on the web.I'm happy to say that dnsmap was included in Backtrack 2, 3 and 4 and has been reviewed by the community: - Backtrack Forums
- Question Defense
- Network World
- Linux Haxor
- Darknet
* ^+ L+ b# \" F' W3 d. Q& b9 f
5 G, ^5 a) O) M2 j2 I j1 ^
DNSmap出现在2006年,是受《Stealing the Network - How to 0wn the Box》这本书的启发而成。DNSmap主要被渗透测试人员用于无线安全评估(infrastructure security assessments)过程中的信息收集和枚举。在信息收集过程中,安全咨询人员要探索目标公司的IP地址块,域名,电话号码等等。而亚域名暴力获取(Subdomain brute-forcing)是一个很有用的技术,特别是区域传输煤气作用的时候(顺便说下,现在区域传送几乎不起作用了)。下面是推荐的一本书Stealing the Network - How to 0wn the Box; D7 b3 s M! G, R
$ J! f7 B& m4 k
PS2:DNSmap-bulk可以批量的获取一系列dns和ip t' i# [) A! m0 E9 j- R( C
用法如下:
7 P* ~; q9 e# W4 t& Zdnsmap-bulk.sh domains.txt! |! ?" P+ {2 T2 g2 o. ~/ N
' _" r* y7 _9 q# O& s$ d# z& g
4 W0 y3 V; V9 {7 w- L: R
: ]( ]" K; R2 {
5 m. Z$ a+ q6 n" i
|