DNS Server linuxLinux serverNETWORK ADMINISTRATIONS

How to extract DNS information like Dns services in kali linux using dnsrecon

Hello
Welcome to Penetration Testing channel,

Today we are going to learn about how to extract DNS information like Dns services,hosts,network resources ,server information and zone transfer information…

dnsrecon is a enumeration tool which is default available in kali linux

using dnsrenon ,we will get information of domain which is mis-configured…

this video is only for education purpose…

lets start …

open terminal

type the following commands,

dnsrecon -h
dnsrecon -t srv -d tcs.com
dnsrecon -t srv -d tata.com
dnsrecon -t std -d tcs.com
dnsrecon -t std -d tata.com
dnsrecon -t axfr -d tcs.com
dnsrecon -t axfr -d tata.com

please like and share the video,,

please subscribe for more updates

,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,
My Other Related Videos:
”””””””””””””””””””””””””””””””””””””””””””””’

Whatsapp Sniffing | WhatsApp Penetration Testing

Kali 2017.1 Installation in vmware player

Kali 2017.1 Installation in Oracle VM virtualbox

Penetration Testing on windows 7 using NSA Exploit (MS17-010) | Exploiting NSA Eternalblue

Penetration Testing on windows 10 using Parrotsec Os | Exploiting window 10 with Metasploit framework

How to use Xerosploit in Kali linux

Parrot Security OS Installation

Security Auditing on linux | Vulnerability Analysis & Assessment on Kali linux

Penetration Testing on Linux ftp server with Metasploit using Vsftpd Vulnerability

Penetration Testing on Wi-fi wpa wpa2 Passwords using wifite

Penetration Testing Wi-Fi WPA/WPA2 without Dictionary and Brute Force Attack

Network Scanning in Windows using Angry IP Scanner:

Network Scanning in Kali using Angry IP Scanner:

Tor Browser Installation in kali:

If u like the video please click on LIKE
if u have any doubt please comment on video…
for more education videos please subscribe the channel…
This video is only for education purpose ….

source

by Penetration Testing

linux dns server

Leave a Reply

Your email address will not be published. Required fields are marked *