Marial's Notes
  • Hello!
  • Pentesterlab Labs
    • Recon Badge
      • recon_00 (/robots.txt)
      • recon_01 (404 pages)
      • recon_02 (/.well-known/security.txt)
      • recon_03 (directory listing)
      • recon_04 (/admin)
      • recon_05 (wfuzz)
      • recon_06 (vhost)
      • recon_07 (vhost over TLS)
      • recon_08 (alt name)
      • recon_09 (header)
      • recon_10 (visual recon)
      • recon_11 (virtual host brute)
      • recon_12 (load balance)
      • recon_13 (TXT)
      • recon_14 (zone transfer)
      • recon_15 (int zone transfer)
      • recon_16 (bind version)
      • recon_17 (dev name)
      • recon_18 (public repos)
      • recon_19 (find email)
      • recon_20 (check branches 1)
      • recon_21 (check branches 2)
      • recon_22 (deleted file)
      • recon_23 (commit message)
      • recon_24 (assets)
      • recon_25 (S3)
      • recon_26 (JS)
  • TryHackMe Rooms
    • Basic Pentesting
    • EasyPeasy
    • Kenobi
    • Vulnversity
Powered by GitBook
On this page
  • OBJECTIVE
  • BIND
  • SOLUTION

Was this helpful?

  1. Pentesterlab Labs
  2. Recon Badge

recon_16 (bind version)

Previousrecon_15 (int zone transfer)Nextrecon_17 (dev name)

Last updated 7 months ago

Was this helpful?

View the exercise here:

OBJECTIVE

For this challenge, your goal is to get the version of bind used by z.hackycorp.com.

BIND

is one of the most common DNS servers used. If you know how to ask, it will reveal its version.

SOLUTION

dig @z.hackycorp.com version.bind CHAOS TXT
  • dig: The tool used for querying DNS.

  • @z.hackycorp.com: Specifies the DNS server (z.hackycorp.com) to query.

  • version.bind: This asks for the version of the DNS server.

  • CHAOS: The DNS class used for special queries like retrieving server information (in this case, the version).

  • TXT: Requests the response as a text record (where the version info is stored).

PentesterLab: Recon 16
Bind