Dark Arts
  • index
  • BUY ME A BOOK
  • 🪄Dark Magic
    • Pentesting
      • Industry Methodologies
    • Scopes of Testing
    • Reconnaissance
      • Passive
        • WHOIS
        • DNS
          • nslookup
          • dig
        • WAF
        • Subdomain
        • Google Dork
        • Misc. Techniques
        • Leaked Passwords
      • Active
        • Browser & Plugins
        • ping & traceroute
        • fping
        • telnet & netcat
        • DNS
          • Zone Transfer
          • DNS Amplification DDoS Attack Breakdown
        • Misc. Techniques
    • Vulnerability Assessment
    • Attack Types
  • 🕷️Aragoogs Nest
    • Web Application Overview & Security
      • Security Testing
      • Common Threats & Risks
    • Web Application Architecture
      • Technologies
    • HTTP/S
      • Message
      • Request
      • Response
        • Status Code
    • Crawling/Spidering
  • 🧪Potions
    • Web Browsers
    • Computer Networking
      • Network Protocol
      • Packets
      • OSI Layer
        • Layer 3: Network
        • Layer 4: Transport
      • DNS
        • Primary-Secondary
        • Local Name Resolution
        • Domain Hierarchy
        • FQDN
        • Lookups
        • DNS Resolution
        • DNS Records
        • Security: Attack-Defense (Default)
  • 🎆Spells
    • 📜Linux Scroll
    • 📜WebShell Scroll
    • git
      • Attacks + Vulnerabilities
  • 🖼️Flaws w/ Magical Frameworks
    • Windows
      • In a Nutshell
      • CVE-2019-0708: BlueKeep
      • CVE-2017-0144: EternalBlue: MS17-010
      • Attacking Services
        • MS IIS - WebDAV
        • SMB
        • HTTP File Server (HFS)
        • Apache Tomcat Web Server
        • RDP
        • WinRM
      • File System Vulnerabilities
      • Credential Dumping
        • Password Search in Windows Configuration Files
        • Mimikatz
        • Pass-the-Hash Attack
    • Linux
      • In a Nutshell
      • CVE-2014-6271: Shellshock
      • Attacking Services
        • FTP
        • SSH
        • SAMBA
        • SMTP
        • RSYNC
      • Dumping Hashes
  • 🌼Marauder's Boost
    • Privilege Escalation
    • Windows PrivEsc
      • Windows Kernel Exploit
      • Bypassing UAC
      • Access Token Impersonation
    • Linux PrivEsc
      • Linux Kernel Exploit
      • Misconfigured Cron Jobs
      • Exploiting SUID Binaries
      • shells
      • File Permissions
  • ☠️Death Eaters
    • Post Exploitation
      • Windows
      • Linux
  • 🪄OLLIVANDERS
    • nmap
      • Host Discovery
      • Port Scan
      • Service & OS
      • NSE
      • Firewall/IDS Evasion
      • Scan Optimization
      • Misc. Methods
    • ffuf
    • Hydra
    • Metasploit Framework
      • Architecture
      • Must to Know
      • msfvenom
      • Auxiliary Modules
      • Service Enumeration
      • Vulnerability Scanning
      • Imports
      • Automating
    • Vulnerability Scanners
    • Wireshark
  • 🚂Platform 9(3/4)
    • Auth-Auth
      • Authentication
        • Password-based Authentication
        • Basic Authentication
        • Multi-factor Authentication
        • Access Token
        • Token-based Authentication
          • JWT
          • OAuth 2.0
    • Secure Headers
      • Content-Security-Policy (CSP)
    • Cryptography
      • Caesar Cipher
  • ⛲Port Pensieve
    • Enumeration
      • SMB & NetBIOS
      • SNMP
    • Wordlists
  • 🔆DUELS
    • Pivoting
    • SMB Relay Attack
  • 🗺️Marauder's Map
    • Web Application Pentesting
    • API Pentesting
      • GraphQL
        • Primer
    • Mobile Application Pentesting
  • 🎧SIDE CHANNEL
    • Side Channel Analysis
    • Timing Side-Channel Attacks
      • Vulnerable Login
  • 🥃Sky
    • Cloud Basics
    • Cloud Management
      • Shared Responsibility Model
    • Using Cloud Resources
      • Monitoring & Alerts
      • Identity & Access Management
      • Scalability & Availability
      • Solution Design
    • Cloud Providers
    • Cloud Security & Regulatory Compliance
      • Resource Protection
      • ICCA: Cloud Security & Regulatory Compliance
    • ICCA Preparation
      • Knowledge Tests
      • Lab
  • 🔷Obsidian
    • Pentest Engagement
      • Scoping
    • Pentest Ethics
      • Rules of Engagement
    • Auditing Fundamentals
      • Process/Lifecycle
      • Pentest & Security Auditing
      • GRC
      • Standards, Frameworks & Guidelines
      • From Audit to Pentest
  • 💢Threat Modeling
    • Why Threat Model?
  • 📡THREAT INTEL
    • Threat Intelligence
    • Tool Dump
  • 📱Anything-Mobile-IoT
    • Firmware
    • Firmware Analysis
      • Example: CVE-2016-1555
    • Firmware Installation/Flashing
  • 🎉Mischeif
    • Social Engineering
    • Phishing
      • GoPhish
    • Pretexting
Powered by GitBook
On this page
  • Forward Lookups
  • Reverse Lookups
  • Authority
  • Authoritative DNS Server
  • Non-Authoritative DNS Server
  • Core Component of Authority
  • TTL (Time to Live)
  1. Potions
  2. Computer Networking
  3. DNS

Lookups

DNS Lookup is the process of resolving domain names to IP addresses and vice versa.

Forward Lookups

This is the most common lookup where the user provides a Fully Qualified Domain Name (FQDN) to a DNS server, which responds with the corresponding IP address.

Using the nslookup or dig command to query the domain name for its IP.

nslookup navidnaf.com
dig navidnaf.com

Reverse Lookups

In this case, the user provides an IP address, and the DNS server responds with the associated domain name.

Performing a reverse DNS query using nslookup with the IP address to retrieve the domain.

nslookup 127.0.0.1
dig -x 127.0.0.1

Authority

Authoritative DNS Server

This server has the original, up-to-date DNS records for a specific domain (zone). It is the official source of truth and can provide accurate, verified responses for queries about the domain. The data comes from the primary authoritative server, which holds the zone files.

Non-Authoritative DNS Server

This server does not have the original DNS records. Instead, it may provide responses based on cached information from previous queries. It can respond quickly but may not always have the latest data if the records have changed.

Core Component of Authority

The core component for DNS authority is the zone file stored on the authoritative DNS server. This file contains the DNS records (like A, MX, CNAME, NS, etc.) for a specific domain or zone.

The Start of Authority (SOA) record is a key part of this, defining the authoritative server and holding critical details such as the domain’s primary DNS server, contact email, and timing information for updates and transfers. This ensures the authoritative DNS server has the definitive and most up-to-date information for its domain.

Example:

example.com.    IN    SOA    ns1.example.com. admin.example.com. (
                    2024091201  ; Serial (YYYYMMDDNN format)
                    3600        ; Refresh (1 hour)
                    1800        ; Retry (30 minutes)
                    1209600     ; Expire (14 days)
                    86400       ; Minimum TTL (1 day)
                )
  • example.com.: The domain name.

  • SOA: Start of Authority record.

  • ns1.example.com.: Primary authoritative DNS server for example.com.

  • admin.example.com.: Email of the domain administrator (replace the first dot with @, so it's admin@example.com).

  • Serial: A version number for the zone file, often formatted as YYYYMMDDNN to indicate changes.

  • Refresh: How often secondary DNS servers should check for updates (here, 1 hour).

  • Retry: The interval for retrying a failed zone transfer (here, 30 minutes).

  • Expire: How long secondary servers will continue to use the zone data if updates fail (here, 14 days).

  • Minimum TTL: Default time to cache DNS records (here, 1 day).

TTL (Time to Live)

TTL (Time to Live) in DNS specifies how long a DNS record should be cached by non-authoritative servers (like ISPs). It is configured on the authoritative server. If the TTL is too long, changes made to the DNS (such as updating IP addresses) may not propagate quickly, leading to outdated information being used until the TTL expires.

PreviousFQDNNextDNS Resolution

Last updated 9 months ago

🧪