DNS information collected -dig

command:

All DNS information: dig mail.163.com any

Filter part of the information: dig + noall + answer mail.163.com | awk '{print & 5}' direct output

 

 Reverse Lookup: dig -x 220.181.12.209 

 

 Query bind version: dig + noall + answer txt chaos VERSION.BIND @ ns3.dnsv4.com

Track DNS: dig + trace www.sina.com @ 8.8.8.8

Directly through the root domain, com domain, sina.com domain iterative query

Dns server can penetrate the relevant version of the vulnerabilities through the official website, access to relevant information dns

FQDN: full qualified domain name fully qualified domain name with the host name and domain name

The header record: A (IPv4), AAAA (A address in IPv6) C Name, NS, MX, PTR

 

Guess you like

Origin www.cnblogs.com/unknownguy/p/11525294.html