0b1d1 Profile picture
Apr 30 14 tweets 6 min read Read on X
🛠️ Penetration Testing: DNS & DHCP

Penetration testing for DNS (Domain Name System) and DHCP (Dynamic Host Configuration Protocol) aims to uncover misconfigurations, vulnerabilities, or weaknesses that attackers might exploit to gain unauthorized access or disrupt services.
⤵️ Image
🔍 DNS Penetration Testing

1. DNS Reconnaissance
•Objective: Collect detailed information about the target domain.
•Common Tools:
•nslookup
•dig
•dnsenum
•fierce
•dnsrecon
Key Techniques:

Zone Transfer Attack (AXFR):

dig @target.com AXFR

If successful, reveals all DNS records — a critical misconfiguration.

Subdomain Enumeration: Use wordlists to uncover hidden subdomains.
Reverse DNS Lookup: Associate IP addresses withtarget.com
@Target 2. DNS Cache Snooping
•Goal: Determine if specific domains have been recently resolved.

•Tool: dig

dig @dns-server targetdomain.com
@Target @dns 3. DNS Spoofing / Poisoning (For labs/simulations only)
•Tricks systems into resolving domain names to attacker-controlled IPs.

Tools:
•ettercap
•mitmproxy
•dnsspoof

⚠️ Requires a Man-in-the-Middle (MITM) position and often involves ARP spoofing.
@Target @dns 📦 DHCP Penetration Testing

1. DHCP Starvation Attack
•Goal: Flood the DHCP server with requests to exhaust the IP address pool.

Tools:
•Yersinia
•dhcpstarv
•Dos-new-ip6 (for IPv6)
@Target @dns 2. Rogue DHCP Server Attack
Goal: Set up a fake DHCP server to assign malicious network settings.

Tools:
Yersinia
dhcpig
responder (includes rogue DHCP capability)

This attack can enable full MITM if clients accept the rogue server’s configuration.
@Target @dns 3. DHCP Information Leakage
Passive sniffing may reveal:
•Network topology
•Gateway IPs
•Internal DNS servers
•Domain naming conventions
@Target @dns ⤵️ Image
Image
Image
Image
@Target @dns ⤵️ Image
Image
Image
Image
@Target @dns ⤵️ Image
Image
Image
Image
@Target @dns ⤵️ Image
Image
Image
Image
@Target @dns ⤵️ Image
@Target @dns 🛡️ Defense Strategies

For DNS:
•Restrict or disable zone transfers.
•Implement DNSSEC to verify DNS responses.
•Monitor and log unusual DNS query activity.

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with 0b1d1

0b1d1 Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @_0b1d1

May 1
Wireless Penetration Testing with Wifipumpkin3 🎃📡

Transform your Wi-Fi adapter into a powerful Evil Twin attack suite Image
Wifipumpkin3 is a versatile rogue access point (AP) framework used in red team operations to simulate malicious Wi-Fi networks and conduct Man-in-the-Middle (MITM) attacks.
Top Features & Use Cases 🚀

🎯 Evil Twin Attacks
Mimic legitimate Wi-Fi networks to trick users into connecting and expose their credentials.

🧲 Captive Portal Injection
Redirect connected victims to fake login portals for phishing and social engineering.
Read 12 tweets
Apr 30
Penetration Testing Basics: How Ethical Hackers Strengthen Security 🧪🔐💻
.
.
.
📌📌📌 Image
Get started with the fundamentals of ethical hacking! Learn how penetration testers identify vulnerabilities, simulate attacks, and help organizations stay protected from real-world threats.
⤵️ Image
Image
Image
Image
Read 6 tweets
Apr 30
🛠️ Penetration Testing: DNS & DHCP

Penetration testing for DNS (Domain Name System) and DHCP (Dynamic Host Configuration Protocol) aims to uncover misconfigurations, vulnerabilities, or weaknesses that attackers might exploit to gain unauthorized access or disrupt services.⤵️ Image
🔍 DNS Penetration Testing

1. DNS Reconnaissance
•Objective: Collect detailed information about the target domain.
•Common Tools:
•nslookup
•dig
•dnsenum
•fierce
•dnsrecon
Key Techniques:
Zone Transfer Attack (AXFR):

dig @target.com AXFR

If successful, reveals all DNS records — a critical misconfiguration.

Subdomain Enumeration: Use wordlists to uncover hidden subdomains.
Reverse DNS Lookup: Associate IP addresses with hotarget.com
Read 15 tweets
Apr 29
⚔️ WordPress Penetration Testing Guide: How to Hunt Vulnerabilities Like a Pro!

WordPress powers over 40% of the web making it a prime target for attackers. Here's a quick and powerful cheatsheet to test the security of WordPress installations
⤵️⤵️ Image
🔍 1. Recon & Enumeration

Identify WordPress via /wp-login.php, /wp-admin/, or meta tags.

Use tools like:

whatweb, wpscan, nmap, dirb, gobuster

---

👥 2. Username Enumeration

Enumerate usernames via:

?author=1

REST API: /wp-json/wp/v2/users

---
🕳️ 3. Vulnerability Scanning

Use WPScan to detect:

Outdated plugins/themes

Core version vulnerabilities

Weak passwords

Exposed user accounts
wpscan --url --enumerate u, vp, vt

---target.com
Read 12 tweets
Apr 27
Wireshark: A Beginner’s Guide 🦈

What is Wireshark?
Wireshark is the world’s most popular network protocol analyzer, used to capture, inspect, and troubleshoot network traffic in real time. It’s a must-have tool for network admins, pentesters, and cybersecurity pros
🧵🧵 Image
Why Use Wireshark? 🔥

🔹 Capture live network packets
🔹 Analyze TCP/IP communications
🔹 Troubleshoot network issues
🔹 Detect suspicious or malicious activities
🔹 Understand how protocols actually work
Key Features for Beginners 🧠

📈 Live Packet Capture
View traffic as it moves through your NIC (Network Interface Card).

🔍 Packet Filtering
Apply filters (like http, ip.addr, tcp.port) to find exactly what you need.
Read 8 tweets
Apr 26
✨ A Deep Dive: Nmap Scanning with Wireshark 🦈 Image
🚀 What Happens During an Nmap Scan?

When you scan with Nmap:
•It sends crafted packets to the target
•It analyzes every response
•It discovers hosts, ports, services, even operating systems
🧠 Step-by-Step:

Analyzing Nmap with Wireshark

🔵 1. Start Wireshark Capture
▫️ Open Wireshark and start capturing first.
▫️ Select the correct interface (Ethernet/Wi-Fi).

🟠 2. Launch Your Nmap Scan
▫️ Run any type of Nmap scan — basic or advanced.
Read 12 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us!

:(