Method and device for detecting domain name takeover vulnerability
A detection method and vulnerability detection technology, applied in the Internet field, can solve problems such as DNS resolution authority takeover and domain name takeover vulnerabilities.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0060] Embodiment 1 of the present invention provides a method for detecting a domain name takeover vulnerability, such as figure 2 shown, including:
[0061] In step 201, the recursive resolution server is queried for the DNS A record of the target domain name.
[0062] In step 202, a response message of the DNS is obtained, and when it is checked that the DNS response status code is SERVFAIL, the DNS A record of the target domain name is queried from the NS server.
[0063] Wherein, the status code is SERVFAIL, indicating that the recursive resolution server cannot be connected to the Internet, the DNSSEC check fails, the NS server is unreachable, and there is no DNS ZONE file corresponding to the domain name on the NS server.
[0064] In step 203, the result of querying the DNS A record of the target domain name returned by the first NS server is obtained, and the first NS server is denoted as NS_1; the domain in charge of the NS_1 server is denoted as DOMAIN_1; The NS s...
Embodiment 2
[0080] Based on the solution proposed in Embodiment 1, the embodiment of the present invention collects several possible domain name takeover vulnerabilities from a relatively complete analysis logic into a complete analysis logic for presentation, such as image 3 shown, including the following steps:
[0081] Step S101, query the DNS A record of the target domain name from the recursive resolution server;
[0082] The recursive resolution server here refers to the DNS resolver, such as the public 114.114.114.114, Google's 8.8.8.8, or the default DNS resolution server provided by major operators.
[0083] The concepts and terms need to be clarified here. Although the DNS server that we usually configure for the computer on the Internet is also called "DNS server", strictly speaking, this name is wrong. According to the DNS specification, it should be called a recursive resolution server ( Or called DNS Resolver), and the authoritative domain name server in the DNS system is ...
Embodiment 3
[0111] like Figure 5 As shown, it is a schematic structural diagram of an apparatus for detecting a domain name takeover vulnerability according to an embodiment of the present invention. The apparatus for detecting a domain name takeover vulnerability in this embodiment includes one or more processors 21 and a memory 22 . in, Figure 5 Take one processor 21 as an example.
[0112] The processor 21 and the memory 22 can be connected by a bus or in other ways, Figure 5 Take the connection through the bus as an example.
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


