DNS Reconnaissance and Vulnerability Discovery
DNS Reconnaissance Report
Situation:
The project focused on performing DNS reconnaissance on the artstailor.com
domain to identify subdomains, associated IP address blocks, and potential vulnerabilities. This involved using tools like the fierce
domain scanner, dnsmap
, and CeWL
for creating custom wordlists to uncover additional subdomains.
Obstacles:
- Limited Default Wordlists: Default wordlists in tools like
fierce
anddnsmap
missed some subdomains, requiring custom wordlists. - Hidden IP Addresses: Some subdomains had private IPs, increasing the complexity of validation.
- Data Corroboration: Ensuring consistency across findings from different tools like
fierce
anddnsmap
.
Actions Taken:
- Used the
fierce
domain scanner to identify subdomains and IP address blocks using default settings and a wide traversal of IP ranges. - Analyzed the source code of
fierce
to locate its default wordlist,default.txt
, stored in/usr/lib/python3/dist-packages/fierce/lists/
. - Generated a custom wordlist with
CeWL
by scraping theartstailor.com
website and used it withfierce
to uncover additional subdomains. - Cross-validated findings with the
dnsmap
domain scanner using both the default and custom wordlists. - Noted hosts identified by their proximity to known IPs during wide traversals.
Results:
- Subdomains Identified:
- Using
fierce
with the default wordlist:mail.artstailor.com
,ns.artstailor.com
,pdc.artstailor.com
,pop.artstailor.com
, andbooks.artstailor.com
. - Using
fierce
with the custom wordlist:costumes.artstailor.com
,linuxserver.artstailor.com
, andKEY005-TrvlNmWThZ4Aj2EDyYQx1A.artstailor.com
. - Using wide traversal:
ceo.artstailor.com
anddevbox.artstailor.com
. - Using
dnsmap
: Subdomains likewww.artstailor.com
andcostumes.artstailor.com
.
- Using
- IP Address Blocks:
- Public:
217.70.184.3
,217.70.184.38
. - Private:
10.70.184.39
,10.70.184.40
,10.70.184.90
,10.70.184.91
, etc.
- Public:
- Key Found:
KEY005-TrvlNmWThZ4Aj2EDyYQx1A==
. - Vulnerability: Subdomains with private IPs (e.g.,
ceo.artstailor.com
anddevbox.artstailor.com
) were publicly discoverable, potentially exposing internal resources.
Tool Purpose Overview
fierce
:
- Identifies subdomains using DNS reconnaissance with wordlists or IP traversals. Useful for mapping domain infrastructure.
dnsmap
:
- Performs subdomain discovery via DNS mapping, using default or custom wordlists for more tailored results.
CeWL
:
- Generates custom wordlists by scraping a target website for unique keywords, improving subdomain discovery.
Custom Wordlists:
- Enhanced subdomain identification by supplementing default lists with context-specific keywords.
Source Code Analysis:
- Located
fierce
's default wordlist (default.txt
), facilitating comparison and tailored scanning.
View PDF Document