DNS
nslookup
╭─░▒▓ │ ~/Heist/results/192.168.105.165/scans ✔ │ took 2m 50s │ at 04:17:17 PM ▓▒░
╰─ nslookup
> SERVER 192.168.105.165
Default server: 192.168.105.165
Address: 192.168.105.165#53
> 127.0.0.1
1.0.0.127.in-addr.arpa name = localhost.
> 192.168.105.165
;; connection timed out; no servers could be reached
>
dig
; <<>> DiG 9.18.1-1-Debian <<>> -p 53 -x 192.168.105.165 @192.168.105.165
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: SERVFAIL, id: 62767
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4000
;; QUESTION SECTION:
;165.105.168.192.in-addr.arpa. IN PTR
;; Query time: 4904 msec
;; SERVER: 192.168.105.165#53(192.168.105.165) (UDP)
;; WHEN: Thu Jul 14 16:10:27 EDT 2022
;; MSG SIZE rcvd: 57
dnsrecon to perform general enumeration
╭─ /home/kali/Heist/results/192.168.105.165/scans ▓▒░───────────────────░▒▓ INT|INT ✘ 7s root@kali
╰─ dnsrecon -n 192.168.105.165 -d heist.offsec 2>&1 | tee /home/kali/Heist/results/192.168.105.165/scans/tcp53/tcp_53_dnsrecon_default_manual.txt
[*] std: Performing General Enumeration against: heist.offsec...
[-] Could not resolve domain: heist.offsec
Last updated