dig
Michael Kjorling
michael at kjorling.com
Mon Sep 10 14:38:11 UTC 2001
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
First find the name servers (I'm snipping the dig output for clarity):
$ dig -x 217.72.195.42 ns
195.72.217.in-addr.arpa. 3600 IN SOA nsx1.cinetic.de. root.nsx1.cinetic.de. 2001083001 21600 7200 604800 3600
Then go ahead and request a zone transfer:
$ dig @nsx1.cinetic.de. 195.72.217.in-addr.arpa. axfr
This will give you the reverse zone, if the administrator allows zone
transfers to your IP. Getting the forward zones is left as an
excercise to the reader and commonly involves some sort of social
engineering.
Michael Kjörling
On Sep 10 2001 16:18 +0200, Oliver wrote:
> Hello,
>
> thanx for Brad et al.
>
> Can anybody tell me a dig command which tells me all about an ip like
> let´s say: 217.72.195.42
> Which gives me all records in the forward zone files and the reverse lookup
> files.
> Phps. somebody knowa??!?!
>
> Olli
- --
Michael Kjörling - michael at kjorling.com - PGP: 8A70E33E
Manager Wolf.COM -- Programmer -- Network Administrator
"We must be the change we wish to see" (Mahatma Gandhi)
^..^ Support the wolves in Norway -- go to ^..^
\/ http://home.no.net/ulvelist/protest_int.htm \/
***** Please only send me emails which concern me *****
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For my PGP key: http://michael.kjorling.com/contact/pgp.html
iD8DBQE7nNBXKqN7/Ypw4z4RAk/YAKCXIXjzxyw8berJwYXeFX4NxxTt+QCdGxFM
2dE0/j7cJgP0sexrudCuMhM=
=5aHS
-----END PGP SIGNATURE-----
More information about the bind-users
mailing list