dig

Michael Kjorling michael at kjorling.com
Mon Sep 10 14:38:11 UTC 2001


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

First find the name servers (I'm snipping the dig output for clarity):

	$ dig -x 217.72.195.42 ns
	195.72.217.in-addr.arpa. 3600   IN      SOA     nsx1.cinetic.de. root.nsx1.cinetic.de. 2001083001 21600 7200 604800 3600

Then go ahead and request a zone transfer:

	$ dig @nsx1.cinetic.de. 195.72.217.in-addr.arpa. axfr

This will give you the reverse zone, if the administrator allows zone
transfers to your IP. Getting the forward zones is left as an
excercise to the reader and commonly involves some sort of social
engineering.


Michael Kjörling


On Sep 10 2001 16:18 +0200, Oliver wrote:

> Hello,
>
> thanx for Brad et al.
>
> Can anybody tell me a dig command which tells me all about an ip like
> let´s say: 217.72.195.42
> Which gives me all records in the forward zone files and the reverse lookup
> files.
> Phps. somebody knowa??!?!
>
> Olli

- -- 
Michael Kjörling - michael at kjorling.com - PGP: 8A70E33E
Manager Wolf.COM -- Programmer -- Network Administrator
"We must be the change we wish to see" (Mahatma Gandhi)

^..^     Support the wolves in Norway -- go to     ^..^
 \/   http://home.no.net/ulvelist/protest_int.htm   \/

***** Please only send me emails which concern me *****

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For my PGP key: http://michael.kjorling.com/contact/pgp.html

iD8DBQE7nNBXKqN7/Ypw4z4RAk/YAKCXIXjzxyw8berJwYXeFX4NxxTt+QCdGxFM
2dE0/j7cJgP0sexrudCuMhM=
=5aHS
-----END PGP SIGNATURE-----




More information about the bind-users mailing list