DNS


Nmap discovered a DNS The running service is Simple DNS Plus

Reverse Lookup


┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/vault]
└─$ nslookup                                                            
> server 192.168.187.172
Default server: 192.168.187.172
Address: 192.168.187.172#53
> 127.0.0.1
1.0.0.127.in-addr.arpa	name = localhost.
> dc.vault.offsec
Server:		192.168.187.172
Address:	192.168.187.172#53
 
Name:	dc.vault.offsec
Address: 192.168.187.172
> dc
;; communications error to 192.168.187.172#53: timed out
;; communications error to 192.168.187.172#53: timed out
;; communications error to 192.168.187.172#53: timed out
;; no servers could be reached
> vault.offsec
Server:		192.168.187.172
Address:	192.168.187.172#53
 
Name:	vault.offsec
Address: 192.168.120.98
Name:	vault.offsec
Address: 192.168.120.116
> 192.168.120.98
;; communications error to 192.168.187.172#53: timed out
;; communications error to 192.168.187.172#53: timed out
;; communications error to 192.168.187.172#53: timed out
;; no servers could be reached
> 192.168.120.116
;; communications error to 192.168.187.172#53: timed out
;; communications error to 192.168.187.172#53: timed out
;; communications error to 192.168.187.172#53: timed out
;; no servers could be reached

nslookup revealed 2 additional IP addresses assigned to the domain; VAULT.OFFSEC

  • 192.168.120.98
  • 192.168.120.116
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/vault]
└─$ ping -c 1 192.168.120.98  
PING 192.168.120.98 (192.168.120.98) 56(84) bytes of data.
 
--- 192.168.120.98 ping statistics ---
1 packets transmitted, 0 received, 100% packet loss, time 0ms
 
 
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/vault]
└─$ ping -c 1 192.168.120.116
PING 192.168.120.116 (192.168.120.116) 56(84) bytes of data.
 
--- 192.168.120.116 ping statistics ---
1 packets transmitted, 0 received, 100% packet loss, time 0ms

Unable to reach them

dig


┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/vault]
└─$ dig any VAULT.OFFSEC @$IP
 
; <<>> DiG 9.20.4-4-Debian <<>> any VAULT.OFFSEC @192.168.187.172
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 11972
;; flags: qr aa rd ra; QUERY: 1, ANSWER: 4, AUTHORITY: 0, ADDITIONAL: 2
 
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4000
;; QUESTION SECTION:
;VAULT.OFFSEC.			IN	ANY
 
;; ANSWER SECTION:
VAULT.OFFSEC.		600	IN	A	192.168.120.116
VAULT.OFFSEC.		600	IN	A	192.168.120.98
VAULT.OFFSEC.		3600	IN	NS	dc.VAULT.OFFSEC.
VAULT.OFFSEC.		3600	IN	SOA	dc.VAULT.OFFSEC. hostmaster.VAULT.OFFSEC. 34 900 600 86400 3600
 
;; ADDITIONAL SECTION:
dc.VAULT.OFFSEC.	3600	IN	A	192.168.187.172
 
;; Query time: 36 msec
;; SERVER: 192.168.187.172#53(192.168.187.172) (TCP)
;; WHEN: Thu May 01 20:01:06 CEST 2025
;; MSG SIZE  rcvd: 153

Those 2 IP addresses are returned again.

dnsenum


┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/vault]
└─$ dnsenum VAULT.OFFSEC --dnsserver $IP -f /usr/share/wordlists/seclists/Discovery/DNS/subdomains-top1million-110000.txt --threads 16
dnsenum VERSION:1.3.1
 
-----   vault.offsec   -----
 
 
Host's addresses:
__________________
 
vault.offsec.                            600      IN    A        192.168.120.116
vault.offsec.                            600      IN    A        192.168.120.98
 
 
Name Servers:
______________
 
dc.vault.offsec.                         3600     IN    A        192.168.187.172
 
 
Mail (MX) Servers:
___________________
 
 
 
Trying Zone Transfers and getting Bind Versions:
_________________________________________________
 
unresolvable name: dc.vault.offsec at /usr/bin/dnsenum line 892 thread 1.
 
Trying Zone Transfer for vault.offsec on dc.vault.offsec ... 
AXFR record query failed: no nameservers
 
 
Brute forcing with /usr/share/wordlists/seclists/Discovery/DNS/subdomains-top1million-110000.txt:
__________________________________________________________________________________________________
 
dc.vault.offsec.                         3600     IN    A        192.168.187.172
gc._msdcs.vault.offsec.                  600      IN    A        192.168.120.98
gc._msdcs.vault.offsec.                  600      IN    A        192.168.120.116
domaindnszones.vault.offsec.             600      IN    A        192.168.120.98
domaindnszones.vault.offsec.             600      IN    A        192.168.120.116
forestdnszones.vault.offsec.             600      IN    A        192.168.120.98
forestdnszones.vault.offsec.             600      IN    A        192.168.120.116
 
 
vault.offsec class C netranges:
________________________________
 
 
 
Performing reverse lookup on 0 ip addresses:
_____________________________________________
 
 
0 results out of 0 IP addresses.
 
 
vault.offsec ip blocks:
________________________
 
 
done.

Those 2 IP addresses are returned again.

dnsrecon


┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/vault]
└─$ dnsrecon -d VAULT.OFFSEC -n $IP -D /usr/share/wordlists/seclists/Discovery/DNS/subdomains-top1million-110000.txt --threads 16  
[*] std: Performing General Enumeration against: VAULT.OFFSEC...
[-] DNSSEC is not configured for VAULT.OFFSEC
[*] 	 SOA dc.VAULT.OFFSEC 192.168.187.172
[*] 	 NS dc.VAULT.OFFSEC 192.168.187.172
[*] 	 A VAULT.OFFSEC 192.168.120.98
[*] 	 A VAULT.OFFSEC 192.168.120.116
[*] Enumerating SRV Records
[+] 	 SRV _kerberos._tcp.VAULT.OFFSEC dc.vault.offsec 192.168.187.172 88
[+] 	 SRV _gc._tcp.VAULT.OFFSEC dc.vault.offsec 192.168.187.172 3268
[+] 	 SRV _kerberos._udp.VAULT.OFFSEC dc.vault.offsec 192.168.187.172 88
[+] 	 SRV _ldap._tcp.VAULT.OFFSEC dc.vault.offsec 192.168.187.172 389
[+] 	 SRV _ldap._tcp.gc._msdcs.VAULT.OFFSEC dc.vault.offsec 192.168.187.172 3268
[+] 	 SRV _ldap._tcp.ForestDNSZones.VAULT.OFFSEC dc.vault.offsec 192.168.187.172 389
[+] 	 SRV _ldap._tcp.dc._msdcs.VAULT.OFFSEC dc.vault.offsec 192.168.187.172 389
[+] 	 SRV _ldap._tcp.pdc._msdcs.VAULT.OFFSEC dc.vault.offsec 192.168.187.172 389
[+] 	 SRV _kerberos._tcp.dc._msdcs.VAULT.OFFSEC dc.vault.offsec 192.168.187.172 88
[+] 	 SRV _kpasswd._tcp.VAULT.OFFSEC dc.vault.offsec 192.168.187.172 464
[+] 	 SRV _kpasswd._udp.VAULT.OFFSEC dc.vault.offsec 192.168.187.172 464
[+] 11 Records Found

Those 2 IP addresses are returned again.