Domain takeover vulnerability detection method and device
A detection method and vulnerability detection technology, applied in the Internet field, can solve problems such as domain name takeover vulnerabilities, DNS resolution authority takeover, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0060] Embodiment 1 of the present invention provides a detection method for a domain name takeover vulnerability, such as figure 2 shown, including:
[0061] In step 201, query the recursive resolution server for the DNS A record of the target domain name.
[0062] In step 202, the DNS response message is obtained, and when it is checked that the DNS response status code is SERVFAIL, the DNS A record of the target domain name is inquired from the NS server.
[0063] Wherein, the status code is SERVFAIL, indicating one or more of the recursive analysis server being unable to network, DNSSEC verification failing, NS server being unreachable, and NS server having no DNS ZONE file corresponding to the domain name.
[0064] In step 203, obtain the result of querying the DNS A record of the target domain name returned by the first NS server, record the first NS server as NS_1; record the domain that the NS_1 server is responsible for as DOMAIN_1; record the first NS server as DOM...
Embodiment 2
[0080] Based on the solution proposed in Embodiment 1, the embodiment of the present invention gathers several possible domain name takeover vulnerabilities into a complete analysis logic for presentation from a relatively complete analysis logic, as shown in image 3 shown, including the following steps:
[0081] Step S101, querying the recursive resolution server for the DNS A record of the target domain name;
[0082] The recursive resolution server here refers to DNS Resolver, such as the public 114.114.114.114, Google's 8.8.8.8, or the default DNS resolution servers provided by major operators.
[0083] Here we need to clarify the concepts and nouns. Although the DNS server we usually configure for computers on the Internet is also called "DNS server", strictly speaking, this name is wrong. According to the DNS specification, it should be called a recursive resolution server ( Or called DNS Resolver), and the authoritative domain name server in the DNS system is called D...
Embodiment 3
[0111] Such as Figure 5 As shown in FIG. 2 , it is a schematic structural diagram of a detection device for a domain name takeover vulnerability according to an embodiment of the present invention. The device for detecting a domain name takeover vulnerability in this embodiment includes one or more processors 21 and a memory 22 . in, Figure 5 A processor 21 is taken as an example.
[0112] Processor 21 and memory 22 can be connected by bus or other means, Figure 5 Take connection via bus as an example.
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


