DNS


Nmap discovered a DNS server on the target port 53 The running service is Simple DNS Plus

Reverse Lookup


┌──(kali㉿kali)-[~/archive/htb/labs/intelligence]
└─$ nslookup                      
> server 10.10.10.248
Default server: 10.10.10.248
Address: 10.10.10.248#53
> 127.0.0.1
;; communications error to 10.10.10.248#53: timed out
1.0.0.127.in-addr.arpa	name = localhost.
> dc
Server:		10.10.10.248
Address:	10.10.10.248#53
 
** server can't find dc: SERVFAIL
> dc.intelligence.htb
;; communications error to 10.10.10.248#53: timed out
Server:		10.10.10.248
Address:	10.10.10.248#53
 
Name:	dc.intelligence.htb
Address: 10.10.10.248
Name:	dc.intelligence.htb
Address: dead:beef::23b
Name:	dc.intelligence.htb
Address: dead:beef::95e:6ab2:ad09:42c7

While reverse lookup failed, querying for the FQDN resulted 2 additional following IPv6 addresses;

  • dead:beef::23b
  • dead:beef::95e:6ab2:ad09:42c7

IPv6


┌──(kali㉿kali)-[~/archive/htb/labs/intelligence]
└─$ rustscan -a dead:beef::23b -b 25000
________________________________________
: https://discord.gg/GFrQsGy           :
: https://github.com/RustScan/RustScan :
 --------------------------------------
Real hackers hack time
 
[~] The config file is expected to be at "/home/kali/.rustscan.toml"
[~] Automatically increasing ulimit value to 5000.
[!] File limit is lower than default batch size. Consider upping with --ulimit. May cause harm to sensitive servers
open [dead:beef::23b]:53
open [dead:beef::23b]:80
open [dead:beef::23b]:88
open [dead:beef::23b]:135
open [dead:beef::23b]:389
open [dead:beef::23b]:445
open [dead:beef::23b]:464
open [dead:beef::23b]:593
open [dead:beef::23b]:636
open [dead:beef::23b]:3268
open [dead:beef::23b]:3269
open [dead:beef::23b]:5985
open [dead:beef::23b]:9389
 
┌──(kali㉿kali)-[~/archive/htb/labs/intelligence]
└─$ rustscan -a dead:beef::95e:6ab2:ad09:42c7 -b 25000
________________________________________
: https://discord.gg/GFrQsGy           :
: https://github.com/RustScan/RustScan :
 --------------------------------------
😵 https://admin.tryhackme.com
 
[~] The config file is expected to be at "/home/kali/.rustscan.toml"
[~] Automatically increasing ulimit value to 5000.
[!] File limit is lower than default batch size. Consider upping with --ulimit. May cause harm to sensitive servers
open [dead:beef::95e:6ab2:ad09:42c7]:53
open [dead:beef::95e:6ab2:ad09:42c7]:80
open [dead:beef::95e:6ab2:ad09:42c7]:88
open [dead:beef::95e:6ab2:ad09:42c7]:135
open [dead:beef::95e:6ab2:ad09:42c7]:389
open [dead:beef::95e:6ab2:ad09:42c7]:445
open [dead:beef::95e:6ab2:ad09:42c7]:464
open [dead:beef::95e:6ab2:ad09:42c7]:593
open [dead:beef::95e:6ab2:ad09:42c7]:636
open [dead:beef::95e:6ab2:ad09:42c7]:3268
open [dead:beef::95e:6ab2:ad09:42c7]:3269
open [dead:beef::95e:6ab2:ad09:42c7]:5985
open [dead:beef::95e:6ab2:ad09:42c7]:9389

Same result as the IPv4 counterpart. No additional service found on those IPv6 address

dig


┌──(kali㉿kali)-[~/archive/htb/labs/intelligence]
└─$ dig any @$IP INTELLIGENCE.HTB   
 
; <<>> DiG 9.18.16-1-Debian <<>> any @10.10.10.248 INTELLIGENCE.HTB
; (1 server found)
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 60513
;; flags: qr aa rd ra; QUERY: 1, ANSWER: 5, AUTHORITY: 0, ADDITIONAL: 4
 
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4000
;; QUESTION SECTION:
;INTELLIGENCE.HTB.		IN	ANY
 
;; ANSWER SECTION:
INTELLIGENCE.HTB.	600	IN	A	10.10.10.248
INTELLIGENCE.HTB.	3600	IN	NS	dc.INTELLIGENCE.HTB.
INTELLIGENCE.HTB.	3600	IN	SOA	dc.INTELLIGENCE.HTB. hostmaster.INTELLIGENCE.HTB. 76 900 600 86400 3600
INTELLIGENCE.HTB.	600	IN	AAAA	dead:beef::23b
INTELLIGENCE.HTB.	600	IN	AAAA	dead:beef::95e:6ab2:ad09:42c7
 
;; ADDITIONAL SECTION:
dc.INTELLIGENCE.HTB.	1200	IN	A	10.10.10.248
dc.INTELLIGENCE.HTB.	1200	IN	AAAA	dead:beef::95e:6ab2:ad09:42c7
dc.INTELLIGENCE.HTB.	1200	IN	AAAA	dead:beef::23b
 
;; Query time: 196 msec
;; SERVER: 10.10.10.248#53(10.10.10.248) (TCP)
;; WHEN: Tue Sep 26 14:29:39 CEST 2023
;; MSG SIZE  rcvd: 253

dig also revealed those 2 IPv6 addresses

dnsenum


┌──(kali㉿kali)-[~/archive/htb/labs/intelligence]
└─$ dnsenum INTELLIGENCE.HTB --dnsserver $IP -f /usr/share/wordlists/seclists/Discovery/DNS/subdomains-top1million-110000.txt 
dnsenum version:1.2.6
 
-----   intelligence.htb   -----
 
 
host's addresses:
__________________
 
intelligence.htb.                        600      IN    A        10.10.10.248
 
 
name servers:
______________
 
dc.intelligence.htb.                     1200     IN    A        10.10.10.248
 
 
mail (mx) servers:
___________________
 
 
 
trying zone transfers and getting bind versions:
_________________________________________________
 
unresolvable name: dc.intelligence.htb at /usr/bin/dnsenum line 900.
 
Trying Zone Transfer for intelligence.htb on dc.intelligence.htb ... 
axfr record query failed: no nameservers
 
 
brute forcing with /usr/share/wordlists/seclists/discovery/dns/subdomains-top1million-110000.txt:
__________________________________________________________________________________________________
 
dc.intelligence.htb.                     1200     IN    A        10.10.10.248
gc._msdcs.intelligence.htb.              600      IN    A        10.10.10.248
domaindnszones.intelligence.htb.         600      IN    A        10.10.10.248
forestdnszones.intelligence.htb.         600      IN    A        10.10.10.248
 
 
intelligence.htb class c netranges:
_______________________________
 
 
 
performing reverse lookup on 0 ip addresses:
_____________________________________________
 
 
0 results out of 0 IP addresses.
 
 
intelligence.htb ip blocks:
_______________________
 
 
done.

Nothing found