DNS隐蔽通道 是可以通过dig 子域名来追踪其真实IP的
比如a.friendskaka.com 是我的外发子域名,那么可以按照下面两个命令来追踪IP:
bonelee@bonelee-VirtualBox:~/桌面$ dig auth.a.friendskaka.com @8.8.8.8 +trace
; <<>> DiG 9.10.3-P4-Ubuntu <<>> auth.a.friendskaka.com @8.8.8.8 +trace
;; global options: +cmd
. 244288 IN NS a.root-servers.net.
. 244288 IN NS b.root-servers.net.
. 244288 IN NS c.root-servers.net.
. 244288 IN NS d.root-servers.net.
. 244288 IN NS e.root-servers.net.
. 244288 IN NS f.root-servers.net.
. 244288 IN NS g.root-servers.net.
. 244288 IN NS h.root-servers.net.
. 244288 IN NS i.root-servers.net.
. 244288 IN NS j.root-servers.net.
. 244288 IN NS k.root-servers.net.
. 244288 IN NS l.root-servers.net.
. 244288 IN NS m.root-servers.net.
. 244288 IN RRSIG NS 8 0 518400 20180204200000 20180122190000 41824 . aFjlqIAoXsDRryxUfpsojm0hwOCoFbPFQ91341fa41TzedQahHQ8M0g/ /VExOM4QUk8tkZYKgK7kkRDAZWzcnCnXP4CZkf8E6SlUkZGjOPAx8YWq i0yXpAaMWERf32SyGg7VwrfEyuGadN8bxKxt7Db+VpuMANq8GCYlvHBE SkzNung1OUeiIu3hRi6jlIRXUqpPMaFmdmXpeTM1iLzCv2YkmwPBTIBX FN7hseM0f7wWZsmUTqCWvoXBO01UX+HlTGLXkKBVj69oRBOAj+eSmYh6 lc1K8emOFqi+za7zNbBAXGY6FWpIQtX0RaPztmbwrnqpdQXOqKOq5wtu tuv+tg==
;; Received 525 bytes from 8.8.8.8#53(8.8.8.8) in 67 ms
com. 172800 IN NS a.gtld-servers.net.
com. 172800 IN NS b.gtld-servers.net.
com. 172800 IN NS c.gtld-servers.net.
com. 172800 IN NS d.gtld-servers.net.
com. 172800 IN NS e.gtld-servers.net.
com. 172800 IN NS f.gtld-servers.net.
com. 172800 IN NS g.gtld-servers.net.
com. 172800 IN NS h.gtld-servers.net.
com. 172800 IN NS i.gtld-servers.net.
com. 172800 IN NS j.gtld-servers.net.
com. 172800 IN NS k.gtld-servers.net.
com. 172800 IN NS l.gtld-servers.net.
com. 172800 IN NS m.gtld-servers.net.
com. 86400 IN DS 30909 8 2 E2D3C916F6DEEAC73294E8268FB5885044A833FC5459588F4A9184CF C41A5766
com. 86400 IN RRSIG DS 8 1 86400 20180204200000 20180122190000 41824 . e5NBTkGk86oh65XaIPWOKt4y8iotYEbml0k468uohpJusmJITYXR557Y Fl4uGIB56vHjIwHiZGWK9fO7cUU7VkMo2Y/1uqzFi+7jJTZ97cb5VnMt Of7CwHq7gFBmyNSlT8xB1UKK3qAzqmsRhMmfZN3xzFkvE8Lvc60hzcA5 B/RmXOfvjugmfD5s877EDcZeO5nV7dlassDQ+wuFE21PbTtgjGkuvFb3 EDsBVLaDq/7JHGLbza50PqWZrsuXrnAVa0j70+lvl1hcUCthf+8FQCLu Wf3Gj4Jnp6P/Z6rSDPGFGjh4SRsfNdTk3UJIIPLpwg0pyGbQaQ7rJxd+ 0/XbWQ==
;; Received 1182 bytes from 199.7.83.42#53(l.root-servers.net) in 263 ms
friendskaka.com. 172800 IN NS dns2.hichina.com.
friendskaka.com. 172800 IN NS dns1.hichina.com.
CK0POJMG874LJREF7EFN8430QVIT8BSM.com. 86400 IN NSEC3 1 1 0 - CK0Q1GIN43N1ARRC9OSM6QPQR81H5M9A NS SOA RRSIG DNSKEY NSEC3PARAM
CK0POJMG874LJREF7EFN8430QVIT8BSM.com. 86400 IN RRSIG NSEC3 8 2 86400 20180128054804 20180121043804 46967 com. HNXfONUp3muIbKeijgpxL+O2PQbZnKpSwl0DzDLTkh2RPvcimEZdRMC0 qBXHUTR1Dn6nx52WKBAEm6qVhk3fy5VIWHwPdcxJO2pyyFc/hx1L/uoi 9/Oq9H4j2VaMxOhfce8x5gdUznrOetVZy536IDxXIfo5IPABw7vA/8b2 BXE=
CO5FD8E5AURAOVOMCLOJRHU4BQPQO18S.com. 86400 IN NSEC3 1 1 0 - CO5GE18T10E6MHBQLNUH2P41UKL4V8R9 NS DS RRSIG
CO5FD8E5AURAOVOMCLOJRHU4BQPQO18S.com. 86400 IN RRSIG NSEC3 8 2 86400 20180126060953 20180119045953 46967 com. icUmkiHfpgcU6Wgnwlhy5p1Afo7tORel/aARJt2a4uKOB/5v9Z+PZgq8 zCvV5kHLyNhAtZ5Woe82OP5ccF8ZtcPJaq2l0NifJVolTFNmh/pDDPc4 MTMdCeLQFVK2wPO7cq1NBdXRHo7DVOsT7KyooEDQbjpbxHwkTpWCB/LD PRo=
;; Received 838 bytes from 192.43.172.30#53(i.gtld-servers.net) in 168 ms
a.friendskaka.com. 600 IN NS ns.friendskaka.com.
;; Received 99 bytes from 140.205.81.13#53(dns1.hichina.com) in 32 ms
;; connection timed out; no servers could be reached
bonelee@bonelee-VirtualBox:~/桌面$ dig ns.friendskaka.com @8.8.8.8
; <<>> DiG 9.10.3-P4-Ubuntu <<>> ns.friendskaka.com @8.8.8.8
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 60388
;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 512
;; QUESTION SECTION:
;ns.friendskaka.com. IN A
;; ANSWER SECTION:
ns.friendskaka.com. 599 IN A 45.77.39.243
;; Query time: 129 msec
;; SERVER: 8.8.8.8#53(8.8.8.8)
;; WHEN: Tue Jan 23 12:04:48 CST 2018
;; MSG SIZE rcvd: 63
但是无法直接通过 dns 隐蔽通道的子域名来追踪,例如下面的例子,可能是因为有=这个奇怪字符:
bonelee@bonelee-VirtualBox:~/桌面$ dig AAAAAFJdQA.=auth.a.friendskaka.com @8.8.8.8 +trace
; <<>> DiG 9.10.3-P4-Ubuntu <<>> AAAAAFJdQA.=auth.a.friendskaka.com @8.8.8.8 +trace
;; global options: +cmd
. 244085 IN NS a.root-servers.net.
. 244085 IN NS b.root-servers.net.
. 244085 IN NS c.root-servers.net.
. 244085 IN NS d.root-servers.net.
. 244085 IN NS e.root-servers.net.
. 244085 IN NS f.root-servers.net.
. 244085 IN NS g.root-servers.net.
. 244085 IN NS h.root-servers.net.
. 244085 IN NS i.root-servers.net.
. 244085 IN NS j.root-servers.net.
. 244085 IN NS k.root-servers.net.
. 244085 IN NS l.root-servers.net.
. 244085 IN NS m.root-servers.net.
. 244085 IN RRSIG NS 8 0 518400 20180204200000 20180122190000 41824 . aFjlqIAoXsDRryxUfpsojm0hwOCoFbPFQ91341fa41TzedQahHQ8M0g/ /VExOM4QUk8tkZYKgK7kkRDAZWzcnCnXP4CZkf8E6SlUkZGjOPAx8YWq i0yXpAaMWERf32SyGg7VwrfEyuGadN8bxKxt7Db+VpuMANq8GCYlvHBE SkzNung1OUeiIu3hRi6jlIRXUqpPMaFmdmXpeTM1iLzCv2YkmwPBTIBX FN7hseM0f7wWZsmUTqCWvoXBO01UX+HlTGLXkKBVj69oRBOAj+eSmYh6 lc1K8emOFqi+za7zNbBAXGY6FWpIQtX0RaPztmbwrnqpdQXOqKOq5wtu tuv+tg==
;; Received 525 bytes from 8.8.8.8#53(8.8.8.8) in 66 ms
com. 172800 IN NS l.gtld-servers.net.
com. 172800 IN NS i.gtld-servers.net.
com. 172800 IN NS m.gtld-servers.net.
com. 172800 IN NS c.gtld-servers.net.
com. 172800 IN NS j.gtld-servers.net.
com. 172800 IN NS k.gtld-servers.net.
com. 172800 IN NS d.gtld-servers.net.
com. 172800 IN NS g.gtld-servers.net.
com. 172800 IN NS h.gtld-servers.net.
com. 172800 IN NS b.gtld-servers.net.
com. 172800 IN NS a.gtld-servers.net.
com. 172800 IN NS e.gtld-servers.net.
com. 172800 IN NS f.gtld-servers.net.
com. 86400 IN DS 30909 8 2 E2D3C916F6DEEAC73294E8268FB5885044A833FC5459588F4A9184CF C41A5766
com. 86400 IN RRSIG DS 8 1 86400 20180204200000 20180122190000 41824 . e5NBTkGk86oh65XaIPWOKt4y8iotYEbml0k468uohpJusmJITYXR557Y Fl4uGIB56vHjIwHiZGWK9fO7cUU7VkMo2Y/1uqzFi+7jJTZ97cb5VnMt Of7CwHq7gFBmyNSlT8xB1UKK3qAzqmsRhMmfZN3xzFkvE8Lvc60hzcA5 B/RmXOfvjugmfD5s877EDcZeO5nV7dlassDQ+wuFE21PbTtgjGkuvFb3 EDsBVLaDq/7JHGLbza50PqWZrsuXrnAVa0j70+lvl1hcUCthf+8FQCLu Wf3Gj4Jnp6P/Z6rSDPGFGjh4SRsfNdTk3UJIIPLpwg0pyGbQaQ7rJxd+ 0/XbWQ==
;; Received 1194 bytes from 192.33.4.12#53(c.root-servers.net) in 310 ms
friendskaka.com. 172800 IN NS dns2.hichina.com.
friendskaka.com. 172800 IN NS dns1.hichina.com.
CK0POJMG874LJREF7EFN8430QVIT8BSM.com. 86400 IN NSEC3 1 1 0 - CK0Q1GIN43N1ARRC9OSM6QPQR81H5M9A NS SOA RRSIG DNSKEY NSEC3PARAM
CK0POJMG874LJREF7EFN8430QVIT8BSM.com. 86400 IN RRSIG NSEC3 8 2 86400 20180128054804 20180121043804 46967 com. HNXfONUp3muIbKeijgpxL+O2PQbZnKpSwl0DzDLTkh2RPvcimEZdRMC0 qBXHUTR1Dn6nx52WKBAEm6qVhk3fy5VIWHwPdcxJO2pyyFc/hx1L/uoi 9/Oq9H4j2VaMxOhfce8x5gdUznrOetVZy536IDxXIfo5IPABw7vA/8b2 BXE=
CO5FD8E5AURAOVOMCLOJRHU4BQPQO18S.com. 86400 IN NSEC3 1 1 0 - CO5GE18T10E6MHBQLNUH2P41UKL4V8R9 NS DS RRSIG
CO5FD8E5AURAOVOMCLOJRHU4BQPQO18S.com. 86400 IN RRSIG NSEC3 8 2 86400 20180126060953 20180119045953 46967 com. icUmkiHfpgcU6Wgnwlhy5p1Afo7tORel/aARJt2a4uKOB/5v9Z+PZgq8 zCvV5kHLyNhAtZ5Woe82OP5ccF8ZtcPJaq2l0NifJVolTFNmh/pDDPc4 MTMdCeLQFVK2wPO7cq1NBdXRHo7DVOsT7KyooEDQbjpbxHwkTpWCB/LD PRo=
;; Received 850 bytes from 192.41.162.30#53(l.gtld-servers.net) in 206 ms
但是有时候又可以:
bonelee@bonelee-VirtualBox:~/桌面$ dig AAAAAFJdQA.=auth.a.friendsakka.xyz @8.8.8.8 +trace
; <<>> DiG 9.10.3-P4-Ubuntu <<>> AAAAAFJdQA.=auth.a.friendsakka.xyz @8.8.8.8 +trace
;; global options: +cmd
. 190689 IN NS a.root-servers.net.
. 190689 IN NS b.root-servers.net.
. 190689 IN NS c.root-servers.net.
. 190689 IN NS d.root-servers.net.
. 190689 IN NS e.root-servers.net.
. 190689 IN NS f.root-servers.net.
. 190689 IN NS g.root-servers.net.
. 190689 IN NS h.root-servers.net.
. 190689 IN NS i.root-servers.net.
. 190689 IN NS j.root-servers.net.
. 190689 IN NS k.root-servers.net.
. 190689 IN NS l.root-servers.net.
. 190689 IN NS m.root-servers.net.
. 190689 IN RRSIG NS 8 0 518400 20180203170000 20180121160000 41824 . jH/C0pRY9kC2UFwDQexQSyk6iVNYTlX2lg0knutGC92WiH+TKpjPKi70 seRlmztrHWNJ3QsXnTArVRNZvjlBg/4HZ8b/lZ6erj1H/qrxQZhMTMt9 LwDHhrg7NzbAzWuacCFzRd3cWNNullap51SKItfXWxUwsUtjEQg5KQ6J EegdfidgedAROoR1rO7GIUYfCqsHgc4ML3Z9U2qZjbHgEGormJBKPHK/ 0Bj3U72oW+PHFUcPptlcT9lxhNf2ivBTTiQUID30iyUscDVPXHoFXgS6 hxlU+uKH+caPziYsw/nnLwGtoRM2fPRq0hA/bJ0jYU1hp51Gh22FjGYu 9R6i7A==
;; Received 525 bytes from 8.8.8.8#53(8.8.8.8) in 55 ms
xyz. 172800 IN NS x.nic.xyz.
xyz. 172800 IN NS y.nic.xyz.
xyz. 172800 IN NS z.nic.xyz.
xyz. 172800 IN NS generationxyz.nic.xyz.
xyz. 86400 IN DS 3599 8 2 B9733869BC84C86BB59D102BA5DA6B27B2088552332A39DCD54BC4E8 D66B0499
xyz. 86400 IN DS 3599 8 1 3FA3B264F45DB5F38BEDEAF1A88B76AA318C2C7F
xyz. 86400 IN RRSIG DS 8 1 86400 20180204200000 20180122190000 41824 . BVHzmP5FP5SXIX4Vldoz3yHdaQzKOfrrDX1oepOSr6eMeLuVjvtbs/VF wv36ce0iasTiQXJxgsxwWHrsGaSyrTejx7V97iP4d+ak8/c7Poica40q IErWd3eZ5Lc5+2Il7Gf0/79XkVE9cGuMt6I3ZGACn7VP3yEXSOWnI6Pz KZHeVAlGgUQpftY7ZzjnxluApCVm+r+OVQi6hK32fMrfoMnyqQBXXbtD gFi3BjxbWzFnDvva5OwOK/6y/qqXZFNKpQi3lrjXJK8lYoUiqmQL88bQ IYx6fP3OpX4xOAG9Ke9v4yR1GZRjx20hLdLXX80Oja+9W1NljaDg5Wtj EmFXwg==
;; Received 690 bytes from 199.9.14.201#53(b.root-servers.net) in 166 ms
friendsakka.xyz. 3600 IN NS ns34.domaincontrol.com.
friendsakka.xyz. 3600 IN NS ns33.domaincontrol.com.
1h97h2oec2juov8dlbbjj6i7ik26bm8d.xyz. 3600 IN NSEC3 1 1 1 - 1H9SP7N22537R92KKG4DNO5R90TMHMCQ NS SOA RRSIG DNSKEY NSEC3PARAM
1h97h2oec2juov8dlbbjj6i7ik26bm8d.xyz. 3600 IN RRSIG NSEC3 8 2 3600 20180126113623 20171227110304 18076 xyz. han/nXPwC8NmMvq7e9bedywXsDEQHxjkXe7KErFelimkDuM7Q8vkDitp v6l/w6FNGB2AUlBLRPOD4Fxk+sdl2D4r8hjkdam1dvjAmbkzw/vMJO6H gdVb4bD2WSyrTq+l45hc+nerG1XUE5Qwu0+Bj6L/ybORD1llxiOTYQMy D/Y=
c19rrbjbgc4rbtss08d8q1mfiqj0fko3.xyz. 3600 IN NSEC3 1 1 1 - C1GGKAORFBAG4JI0F0LJG6NLJK910REV NS DS RRSIG
c19rrbjbgc4rbtss08d8q1mfiqj0fko3.xyz. 3600 IN RRSIG NSEC3 8 2 3600 20180217004626 20180117191209 10653 xyz. aXCV1Ulk51RKwcguxLm442+ncAtfXwCkgY12Im+87eQQosatYF5J93O3 d1rk5hQguB3BPp7/JMLQkAeJHGad2j4SU0T8iy6v7TjwjWGQ7+IsNwoT pHBri5ePZMSJIkBh3eVjBtrfxd8ARCCX/zzAJiqpChE1v4YYfEW1M9bL qtM=
;; Received 603 bytes from 185.24.64.42#53(y.nic.xyz) in 209 ms
a.friendsakka.xyz. 600 IN NS ns.friendsakka.xyz.
;; Received 96 bytes from 208.109.255.17#53(ns34.domaincontrol.com) in 383 ms
DNS隐蔽通道 是可以通过dig 子域名来追踪其真实IP的的更多相关文章
- AI安全初探——利用深度学习检测DNS隐蔽通道
AI安全初探——利用深度学习检测DNS隐蔽通道 目录 AI安全初探——利用深度学习检测DNS隐蔽通道 1.DNS 隐蔽通道简介 2. 算法前的准备工作——数据采集 3. 利用深度学习进行DNS隐蔽通道 ...
- 利用机器学习进行DNS隐蔽通道检测——数据收集,利用iodine进行DNS隐蔽通道样本收集
我们在使用机器学习做DNS隐蔽通道检测的过程中,不得不面临样本收集的问题,没办法,机器学习没有样本真是“巧妇难为无米之炊”啊! 本文简单介绍了DNS隐蔽通道传输工具iodine,并介绍如何从iodin ...
- DNS 隐蔽通道工具资料汇总
http://www.cnblogs.com/bonelee/p/7651746.html DNS隧道和工具 内含dns2tcp.iodine.dnscat2工具的简单使用说明 iodine工具的使用 ...
- 子域名收集之DNS字典爆破工具fierce与dnsdict6的使用
子域名收集之DNS字典爆破工具fierce与dnsdict6的使用 一.fierce 0.介绍 该工具是一个域名扫描综合性工具.它可以快速获取指定域名的DNS服务器,并检查是否存在区域传输(Zone ...
- 子域名查询、DNS记录查询
目录 子域名信息查询 Layer子域名爆破机 subDomainBrute 利用google查询 HTTP证书查询 DNS记录查询脚本 IP转换为经纬度 利用网页获取对方经纬度信息 首先关于DNS域名 ...
- ★Kali信息收集~3.子域名系列
★3.1Netcraft :子域名查询 官网:http://searchdns.netcraft.com/ 输入要查询的域名,即可得知子域名 3.2Fierce :子域名查询 概述: fierce ...
- 使用python处理子域名爆破工具subdomainsbrute结果txt
近期学习了一段时间python,结合自己的安全从业经验,越来越感觉到安全测试是一个体力活.如果没有良好的coding能力去自动化的话,无疑会把安全测试效率变得很低. 作为安全测试而言,第一步往往要通过 ...
- 添加Godaddy二级域名子域名方法
我们在申请注册了Godaddy域名后,如果需要开通二级域名,方法简单只需要在Godaddy添加二级域名(子域名)只要在域名管理后台添加A记录或CNAME别名(Aliases)即可.但我们如果需要添加二 ...
- 子域名扫描器 - aquatone
项目地址:https://github.com/michenriksen/aquatone git clone,然后打开 ┌─[root@sch01ar]─[/sch01ar] └──╼ #git c ...
随机推荐
- Ubuntu16安装jdk8配置Tomcat9
一.配置jdk 1.下载解压是肯定不能少的 2.配置环境变量根据自己需求来 export JAVA_HOME=/usr/software/jdk1.8.0_121 export CLASSPATH=. ...
- canves图形变换
canves用得好可以有好多效果: html:<canvas id="myCanvas" width="700" height="300&quo ...
- nginx-配置反向代理实例
nginx反向代理配置及优化 2009-05-26 作者:守住每一天blog:liuyu.blog.51cto.combbs:bbs.linuxtone.orgmsn:liuyubj520#hotma ...
- js输出非字符串,非null值
console.log(!"");//非空(true) console.log(!);//非0(true) console.log(!" ");//非空格(fa ...
- 【Redis】一、Redis简介及五种数据类型
(一)Redis简介 Redis(Remote Dictionary Server)是一个使用ANSI C语言编写.遵守BSD协议.支持网络.可基于内存亦可持久化的日志型.Key-Value的开源 ...
- 本地文件与服务器文件同步shell脚本
为何创建此脚本是因为方便项目的布署,不需要手动地去同步不同的项目,而只需要简单的执行shell脚本,输入项目名就能发布到服器上. 1.shell文件代码 #!/bin/sh read -t 30 -p ...
- uva-679 Dropping Balls UVA - 679
题目大意 总共有一个深度为D的满二叉树,I个小球,每个节点具有开关,小球经过节点后节点开关会有变化,初始都关闭,若关闭往左右否则往右走 只需要循环一下每层的情况即可 代码 #include <b ...
- 二叉堆 及 大根堆的python实现
Python 二叉堆(binary heap) 二叉堆是一种特殊的堆,二叉堆是完全二叉树或者是近似完全二叉树.二叉堆满足堆特性:父节点的键值总是保持固定的序关系于任何一个子节点的键值,且每个节点的左子 ...
- Linux日期时间
#日期时间 echo '日期时间' datetime=$(date "+%Y-%m-%d %H:%M:%S") echo "$datetime"
- 面向对象:__getitem__、__setitem__、__delitem__
item系列 class Person(object): def __init__(self, name): self.name = name def __getitem__(self, item): ...