DNS


Nmap discovered a DNS server on the port 53 of the dc01.heist.offsec(192.168.198.165) host. The running service is Simple DNS Plus.

Reverse Lookup


┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/heist]
└─$ nslookup                                                                  
> server 192.168.198.165
Default server: 192.168.198.165
Address: 192.168.198.165#53
> 127.0.0.1
1.0.0.127.in-addr.arpa	name = localhost.
> HEIST.OFFSEC
Server:		192.168.198.165
Address:	192.168.198.165#53
 
Name:	HEIST.OFFSEC
Address: 192.168.120.91
> dc01.heist.offsec
Server:		192.168.198.165
Address:	192.168.198.165#53
 
Name:	dc01.heist.offsec
Address: 192.168.198.165

dig


┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/heist]
└─$ dig any dc01.heist.offsec @$IP     
 
; <<>> DiG 9.20.9-1-Debian <<>> any dc01.heist.offsec @192.168.198.165
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 49774
;; flags: qr aa rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1
 
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4000
;; QUESTION SECTION:
;dc01.heist.offsec.		IN	ANY
 
;; ANSWER SECTION:
dc01.heist.offsec.	3600	IN	A	192.168.198.165
 
;; Query time: 24 msec
;; SERVER: 192.168.198.165#53(192.168.198.165) (TCP)
;; WHEN: Mon Jul 07 16:21:06 CEST 2025
;; MSG SIZE  rcvd: 62
 
 
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/heist]
└─$ dig any HEIST.OFFSEC @$IP     
 
; <<>> DiG 9.20.9-1-Debian <<>> any HEIST.OFFSEC @192.168.198.165
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 53427
;; flags: qr aa rd ra; QUERY: 1, ANSWER: 3, AUTHORITY: 0, ADDITIONAL: 2
 
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4000
;; QUESTION SECTION:
;HEIST.OFFSEC.			IN	ANY
 
;; ANSWER SECTION:
HEIST.OFFSEC.		600	IN	A	192.168.120.91
HEIST.OFFSEC.		3600	IN	NS	dc01.HEIST.OFFSEC.
HEIST.OFFSEC.		3600	IN	SOA	dc01.HEIST.OFFSEC. hostmaster.HEIST.OFFSEC. 20 900 600 86400 3600
 
;; ADDITIONAL SECTION:
dc01.HEIST.OFFSEC.	3600	IN	A	192.168.198.165
 
;; Query time: 20 msec
;; SERVER: 192.168.198.165#53(192.168.198.165) (TCP)
;; WHEN: Mon Jul 07 16:21:12 CEST 2025
;; MSG SIZE  rcvd: 139

N/A

dnsenum


┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/heist]
└─$ dnsenum HEIST.OFFSEC --dnsserver $IP -f /usr/share/wordlists/seclists/Discovery/DNS/subdomains-top1million-110000.txt --threads 16 -r 
dnsenum VERSION:1.3.1
 
-----   heist.offsec   -----
 
 
Host's addresses:
__________________
 
heist.offsec.                            600      IN    A        192.168.120.91
 
 
Name Servers:
______________
 
dc01.heist.offsec.                       3600     IN    A        192.168.198.165
 
 
Mail (MX) Servers:
___________________
 
 
 
Trying Zone Transfers and getting Bind Versions:
_________________________________________________
 
unresolvable name: dc01.heist.offsec at /usr/bin/dnsenum line 892 thread 1.
 
Trying Zone Transfer for heist.offsec on dc01.heist.offsec ... 
AXFR record query failed: no nameservers
 
 
Brute forcing with /usr/share/wordlists/seclists/Discovery/DNS/subdomains-top1million-110000.txt:
__________________________________________________________________________________________________
 
gc._msdcs.heist.offsec.                  600      IN    A        192.168.120.91
domaindnszones.heist.offsec.             600      IN    A        192.168.120.91
forestdnszones.heist.offsec.             600      IN    A        192.168.120.91
dc01.heist.offsec.                       3600     IN    A        192.168.198.165
 
 
Performing recursion:
______________________
 
 
 ---- Checking subdomains NS records ----
 
  Can't perform recursion no NS records.
 
 
heist.offsec class C netranges:
________________________________
 
 
 
Performing reverse lookup on 0 ip addresses:
_____________________________________________
 
 
0 results out of 0 IP addresses.
 
 
heist.offsec ip blocks:
________________________
 
 
done.

dnsrecon


┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/heist]
└─$ dnsrecon -d HEIST.OFFSEC -n $IP -D /usr/share/wordlists/seclists/Discovery/DNS/subdomains-top1million-110000.txt --threads 16  
[*] std: Performing General Enumeration against: HEIST.OFFSEC...
[-] DNSSEC is not configured for HEIST.OFFSEC
[*] 	 SOA dc01.HEIST.OFFSEC 192.168.198.165
[*] 	 NS dc01.HEIST.OFFSEC 192.168.198.165
[*] 	 A HEIST.OFFSEC 192.168.120.91
[*] Enumerating SRV Records
[+] 	 SRV _kerberos._tcp.HEIST.OFFSEC dc01.heist.offsec 192.168.198.165 88
[+] 	 SRV _kerberos._udp.HEIST.OFFSEC dc01.heist.offsec 192.168.198.165 88
[+] 	 SRV _gc._tcp.HEIST.OFFSEC dc01.heist.offsec 192.168.198.165 3268
[+] 	 SRV _ldap._tcp.HEIST.OFFSEC dc01.heist.offsec 192.168.198.165 389
[+] 	 SRV _ldap._tcp.pdc._msdcs.HEIST.OFFSEC dc01.heist.offsec 192.168.198.165 389
[+] 	 SRV _ldap._tcp.gc._msdcs.HEIST.OFFSEC dc01.heist.offsec 192.168.198.165 3268
[+] 	 SRV _ldap._tcp.dc._msdcs.HEIST.OFFSEC dc01.heist.offsec 192.168.198.165 389
[+] 	 SRV _kpasswd._tcp.HEIST.OFFSEC dc01.heist.offsec 192.168.198.165 464
[+] 	 SRV _kerberos._tcp.dc._msdcs.HEIST.OFFSEC dc01.heist.offsec 192.168.198.165 88
[+] 	 SRV _ldap._tcp.ForestDNSZones.HEIST.OFFSEC dc01.heist.offsec 192.168.198.165 389
[+] 	 SRV _kpasswd._udp.HEIST.OFFSEC dc01.heist.offsec 192.168.198.165 464
[+] 11 Records Found