DNS


Nmap discovered a DNS service on the target port 53 The service running is Simple DNS Plus

Reverse Lookup


──(kali㉿kali)-[~/archive/htb/labs/sauna]
└─$ nslookup                                       
> server 10.10.10.175
Default server: 10.10.10.175
Address: 10.10.10.175#53
> 127.0.0.1
1.0.0.127.in-addr.arpa	name = localhost.
> egotistical-bank.local
;; communications error to 10.10.10.175#53: timed out
Server:		10.10.10.175
Address:	10.10.10.175#53
 
Name:	egotistical-bank.local
Address: 10.10.10.175
Name:	egotistical-bank.local
Address: dead:beef::d82a:5af8:762a:f639
> sauna.egotistical-bank.local
Server:		10.10.10.175
Address:	10.10.10.175#53
 
Name:	sauna.egotistical-bank.local
Address: 10.10.10.175
Name:	sauna.egotistical-bank.local
Address: dead:beef::64df:5bff:4879:1d8b
Name:	sauna.egotistical-bank.local
Address: dead:beef::17a

While reverse lookup isn’t available, nslookup found 3 additional IPv6 addresses;

  • dead:beef::d82a:5af8:762a:f639
  • dead:beef::64df:5bff:4879:1d8b
  • dead:beef::17a

IPv6


┌──(kali㉿kali)-[~/archive/htb/labs/sauna]
└─$ rustscan -a dead:beef::64df:5bff:4879:1d8b -b 20000
________________________________________
: https://discord.gg/GFrQsGy           :
: https://github.com/RustScan/RustScan :
 --------------------------------------
Real hackers hack time
 
[~] The config file is expected to be at "/home/kali/.rustscan.toml"
[~] Automatically increasing ulimit value to 5000.
[!] File limit is lower than default batch size. Consider upping with --ulimit. May cause harm to sensitive servers
open [dead:beef::64df:5bff:4879:1d8b]:53
open [dead:beef::64df:5bff:4879:1d8b]:80
open [dead:beef::64df:5bff:4879:1d8b]:88
open [dead:beef::64df:5bff:4879:1d8b]:135
open [dead:beef::64df:5bff:4879:1d8b]:389
open [dead:beef::64df:5bff:4879:1d8b]:445
open [dead:beef::64df:5bff:4879:1d8b]:464
open [dead:beef::64df:5bff:4879:1d8b]:593
open [dead:beef::64df:5bff:4879:1d8b]:3268
open [dead:beef::64df:5bff:4879:1d8b]:3269
open [dead:beef::64df:5bff:4879:1d8b]:5985
open [dead:beef::64df:5bff:4879:1d8b]:9389
 
┌──(kali㉿kali)-[~/archive/htb/labs/sauna]
└─$ rustscan -a dead:beef::17a -b 20000
________________________________________
: https://discord.gg/GFrQsGy           :
: https://github.com/RustScan/RustScan :
 --------------------------------------
😵 https://admin.tryhackme.com
 
[~] The config file is expected to be at "/home/kali/.rustscan.toml"
[~] Automatically increasing ulimit value to 5000.
[!] File limit is lower than default batch size. Consider upping with --ulimit. May cause harm to sensitive servers
open [dead:beef::17a]:53
open [dead:beef::17a]:80
open [dead:beef::17a]:88
open [dead:beef::17a]:135
open [dead:beef::17a]:389
open [dead:beef::17a]:445
open [dead:beef::17a]:464
open [dead:beef::17a]:593
open [dead:beef::17a]:3269
open [dead:beef::17a]:3268
open [dead:beef::17a]:5985
open [dead:beef::17a]:9389

whiledead:beef::d82a:5af8:762a:f639 is not reachable, the scan result shows that those 2 IPv6 addresses aren’t hosting anything exclusive compared to the IPv4 counter part

dig


┌──(kali㉿kali)-[~/archive/htb/labs/sauna]
└─$ dig any EGOTISTICAL-BANK.LOCAL @$IP
 
; <<>> DiG 9.18.10-2-Debian <<>> any EGOTISTICAL-BANK.LOCAL @10.10.10.175
;; global options: +cmd
;; Got answer:
;; WARNING: .local is reserved for Multicast DNS
;; You are currently testing what happens when an mDNS query is leaked to DNS
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 4127
;; flags: qr aa rd ra; QUERY: 1, ANSWER: 4, AUTHORITY: 0, ADDITIONAL: 4
 
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4000
;; QUESTION SECTION:
;EGOTISTICAL-BANK.LOCAL.		IN	ANY
 
;; ANSWER SECTION:
EGOTISTICAL-BANK.LOCAL.	600	IN	A	10.10.10.175
EGOTISTICAL-BANK.LOCAL.	3600	IN	NS	sauna.EGOTISTICAL-BANK.LOCAL.
EGOTISTICAL-BANK.LOCAL.	3600	IN	SOA	sauna.EGOTISTICAL-BANK.LOCAL. hostmaster.EGOTISTICAL-BANK.LOCAL. 48 900 600 86400 3600
EGOTISTICAL-BANK.LOCAL.	600	IN	AAAA	dead:beef::d82a:5af8:762a:f639
 
;; ADDITIONAL SECTION:
sauna.EGOTISTICAL-BANK.LOCAL. 3600 IN	A	10.10.10.175
sauna.EGOTISTICAL-BANK.LOCAL. 3600 IN	AAAA	dead:beef::64df:5bff:4879:1d8b
sauna.EGOTISTICAL-BANK.LOCAL. 3600 IN	AAAA	dead:beef::17a
 
;; Query time: 25 msec
;; SERVER: 10.10.10.175#53(10.10.10.175) (TCP)
;; WHEN: Sat Mar 25 16:39:49 CET 2023
;; MSG SIZE  rcvd: 234

While dig also found those 3 additional IPv6 addresses, it doesn’t find anything new

dnsenum


┌──(kali㉿kali)-[~/archive/htb/labs/sauna]
└─$ dnsenum EGOTISTICAL-BANK.LOCAL --dnsserver $IP -f /usr/share/wordlists/seclists/Discovery/DNS/subdomains-top1million-5000.txt
dnsenum version:1.2.6
 
-----   egotistical-bank.local   -----
 
 
host's addresses:
__________________
 
egotistical-bank.local.                  600      IN    A        10.10.10.175
 
 
name servers:
______________
 
sauna.egotistical-bank.local.            3600     IN    A        10.10.10.175
 
 
mail (mx) servers:
___________________
 
 
 
trying zone transfers and getting bind versions:
_________________________________________________
 
unresolvable name: sauna.egotistical-bank.local at /usr/bin/dnsenum line 900.
 
Trying Zone Transfer for egotistical-bank.local on sauna.egotistical-bank.local ... 
axfr record query failed: no nameservers
 
 
brute forcing with /usr/share/wordlists/seclists/discovery/dns/subdomains-top1million-5000.txt:
________________________________________________________________________________________________
 
gc._msdcs.egotistical-bank.local.        600      IN    A        10.10.10.175
domaindnszones.egotistical-bank.local.   600      IN    A        10.10.10.175
forestdnszones.egotistical-bank.local.   600      IN    A        10.10.10.175
 
 
egotistical-bank.local class c netranges:
__________________________________________
 
 
 
performing reverse lookup on 0 ip addresses:
_____________________________________________
 
 
0 results out of 0 IP addresses.
 
 
egotistical-bank.local ip blocks:
__________________________________
 
 
done.

dnsenum hasn’t found anything new

Moving on