Case Project 4-2: Testing DNS Security Time Required: 30 minutes Objective: Create a report outlining a plan to determine if any DNS servers are vulnerable to zone transfer attacks. Description: You have just joined the IT department at the Alexander Rocco Corporation. You are trying to learn the configuration of the corporate network, including what DNS servers are in place and how they are configured. Other IT staff members are too busy to train you, so you decide to figure things out for yourself. You know better than to start scanning the network and checking for vulnerabilities without written authorization, so you are going to create a document that will outline what you would like to do and have it approved by your manager. Create a two-page report to submit for your manager's approval. In this report, outline what tools you might use and how you would use them to discover what DNS servers you have on your network and whether any DNS servers you discover are vulnerable to zone transfer attacks. with proper references
Case Project 4-2: Testing DNS Security Time Required: 30 minutes Objective: Create a report outlining a plan to determine if any DNS servers are vulnerable to zone transfer attacks. Description: You have just joined the IT department at the Alexander Rocco Corporation. You are trying to learn the configuration of the corporate network, including what DNS servers are in place and how they are configured. Other IT staff members are too busy to train you, so you decide to figure things out for yourself. You know better than to start scanning the network and checking for vulnerabilities without written authorization, so you are going to create a document that will outline what you would like to do and have it approved by your manager. Create a two-page report to submit for your manager's approval. In this report, outline what tools you might use and how you would use them to discover what DNS servers you have on your network and whether any DNS servers you discover are vulnerable to zone transfer attacks. with proper references
Trending now
This is a popular solution!
Step by step
Solved in 4 steps