Well after a long absence because of vacation and arrived moments ago, I again to give life to the blog, I salute giving a Happy 2010 and we all continue to grow, healthy, and I hope this year continues to cool folks know how I did in 2009, which was great. Well the reason for this post is talking about a technique called reverse DNS, which in a pentest should not be left aside, and Security always breaks at the weakest link in the chain. Many know that some sites are Hosted on servers where you share it with other clients, ie a server that is hosted on different pages or Virtual Host. This technique is used to tell which page is related to the page that we are testing. Ie if our target is www.ejemplo.com.ar , and is hosted on a server are: www.ejemplo1.com.ar www.ejemplo2.com.ar www . ejemplo3.com.ar . . www.ejemploN.com.ar tools that manage the Reverse DNS to show us these pages. The script that I bring are 3 performing the action which are codeadas in PHP, Python and Perl to use depending on the occasion one or the other (always good to have codeadas in different languages).
codes in PHP and Python were codeadas by my friend Daniel Godoy, whom I met in Salta, where he did a interview
days later, I will pass your Blog that is not good, is very good I recommend it. Why is this important? When we can not undermine the page that we are testing, whether for knowledge or because there is no way we could think that if you violate one hosted on the same server, get the confidence, he gives us incapiƩ which to climb and reach our goal. This me have had xD haha \u200b\u200b... Well there I leave the code in paste2.org. S0urc3 PHP Python S0urc3 S0urc3 Perl
Greetings ..
0 comments:
Post a Comment