For this lab, you’ll need Kali Linux.

By analyzing publicly available DNS records, security professionals and adversaries alike can map an organization's network infrastructure, identifying key servers, subdomains, and other relevant details.

By analyzing publicly available DNS records, security professionals and adversaries alike can map an organization's network infrastructure, identifying key servers, subdomains, and other relevant details.

A Corporate Topology might look like this:

image.png

In enterprise environments, there will be a ‘primary’ DNS server and at least one ‘secondary’ DNS server.

image.png

The best practice is that this ‘zone transfer’ operation will be protected by at least a shared secret (password). The secondary server requesting the ‘zone transfer’ will provide the correct authentication credentials before receiving the DNS records and IP Addresses that are associated with them.

However, it is possible to configure the primary server so that no password is necessary. This is known as an ‘unauthenticated zone transfer.’

Case and Point: North Korea

Lab Objective: