DNS


Nmap discovered a DNS server running on the target port 53 The service is dnsmasq 2.76

Reverse Lookup


┌──(kali㉿kali)-[~/archive/htb/labs/mirai]
└─$ nslookup              
> server 10.10.10.48
Default server: 10.10.10.48
Address: 10.10.10.48#53
> 127.0.0.1
;; communications error to 10.10.10.48#53: timed out
1.0.0.127.in-addr.arpa	name = localhost.
> 10.10.10.48
** server can't find 48.10.10.10.in-addr.arpa: NXDOMAIN

Reverse lookup failed.

Vulnerability


┌──(kali㉿kali)-[~/archive/htb/labs/mirai]
└─$ searchsploit dnsmasq 2.76
----------------------------------------------------- ---------------------------------
 Exploit Title                                       |  Path
----------------------------------------------------- ---------------------------------
Dnsmasq < 2.78 - 2-byte Heap Overflow                | multiple/dos/42941.py
Dnsmasq < 2.78 - Heap Overflow                       | multiple/dos/42942.py
Dnsmasq < 2.78 - Information Leak                    | multiple/dos/42944.py
Dnsmasq < 2.78 - Integer Underflow                   | multiple/dos/42946.py
Dnsmasq < 2.78 - Lack of free() Denial of Service    | multiple/dos/42945.py
Dnsmasq < 2.78 - Stack Overflow                      | multiple/dos/42943.py
----------------------------------------------------- ---------------------------------
shellcodes: No Results
papers: No Results

dnsmasq 2.76 is vulnerable to buffer overflow. There are a lot of exploits available.