DNS区域传输、DNS字典爆破、DNS注册信息
╋━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━╋
┃DNS区域传输┃
┃ dig @ axfr ┃
┃ host -T -l 8.8.8.8 ┃
╋━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━╋
root@kali:~# dig @ axfr
;; Connection to 114.134.80.145#53(114.134.80.145) for failed: connection refused.
root@kali:~# dig @ axfr
; <<>> DiG 9.9.5-9+deb8u3-Debian <<>> @ axfr
; (1 server found)
;; global options: +cmd
; Transfer failed.
root@kali:~# host -T -l 8.8.8.8
Using domain server:
Name: 8.8.8.8
Address: 8.8.8.8#53
Aliases:
Host not found: 2(SERVFAIL)
; Transfer failed.
root@kali:~# host -h
host: illegal option -- h
Usage: host [-aCdlriTwv] [-c class] [-N ndots] [-t type] [-W time]
[-R number] [-m flag] hostname [server]
-a is equivalent to -v -t ANY
-c specifies query class for non-IN data
-C compares SOA records on authoritative nameservers
-d is equivalent to -v
-l lists all hosts in a domain, using AXFR
-i IP6.INT reverse lookups
-N changes the number of dots allowed before root lookup is done
-r disables recursive processing
-R specifies number of retries for UDP packets
-s a SERVFAIL response should stop query
-t specifies the query type
-T enables TCP/IP mode
-v enables verbose output
-w specifies to wait forever for a reply
-W specifies how long to wait for a reply
-4 use IPv4 query transport only
-6 use IPv6 query transport only
-m set memory debugging flag (trace|record|usage)
root@kali:~# man host//查看该命令的基础用法
root@kali:~# info host//查看该命令的基础用法
╋━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━╋
┃DNS字典爆破 ┃
┃ firece -desserver 8.8.8.8 -dns -wordlist a.txt ┃
┃ dnsdict6 -d4 -t 16 -x ┃
┃ dnsenum -f dnsbig.txt -dnsserver 8.8.8.8 -o sina.xml ┃
┃ dnsmap -w dns.txt ┃
┃ dnsrecon -d --lifetime 10 -t brt -D dnsbig.txt ┃
┃ dnsrecon -t std -d ┃
╋━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━╋
root@kali:~# fierce -dnsserver 8.8.8.8 -dns wordlist a.txt
DNS Servers for :
Trying zone transfer first...
Unsuccessful in zone transfer (it was worth a shot)
Okay, trying the good old fashioned way... brute force
Checking for wildcard DNS...
** Found at 202.102.110.204.
** High probability of wildcard DNS.
Now performing 2280 test(s)...
123.125.29.250
58.63.236.239
58.63.236.237
58.63.236.230
58.63.236.239
58.63.236.237
58.63.236.230
121.14.1.189
121.14.1.190
58.63.236.248
……
root@kali:~# dpkg -L fierce
/.
/usr
/usr/share
/usr/share/doc
/usr/share/doc/fierce
/usr/share/doc/fierce/copyright
/usr/share/doc/fierce/changelog.Debian.gz
/usr/share/fierce
/usr/share/fierce/hosts.txt
/usr/bin
/usr/bin/fierce
more命令,功能类似 cat ,cat命令是整个文件的内容从上到下显示在屏幕上。 more会以一页一页的显示方便使用者逐页阅读,而最基本的指令就是按空白键(space)就往下一页显示,按 b 键就会往回(back)一页显示,而且还有搜寻字串的功能 。more命令从前向后读取文件,因此在启动时就加载整个文件。
more命令和cat的功能一样都是查看文件里的内容,但有所不同的是more可以按页来查看文件的内容,还支持直接跳转行等功能。
root@kali:~# more /usr/share/fierce/hosts.txt
root@kali:~# cat /usr/share/fierce/hosts.txt | grep www
www
www-
www-01
www-02
www-1
www-2
www-int
www0
www01
www02
www1
www2
www3
www_
wwwchat
wwwdev
wwwmail
root@kali:~# fierce -dnsserver 8.8.8.8 -dns wordlist a.txt /usr/share/fierce/hosts.txt
DNS Servers for :
Trying zone transfer first...
Unsuccessful in zone transfer (it was worth a shot)
Okay, trying the good old fashioned way... brute force
Checking for wildcard DNS...
** Found at 202.102.110.204.
** High probability of wildcard DNS.
Now performing 2280 test(s)...
123.125.29.250
58.63.236.239
58.63.236.237
58.63.236.230
58.63.236.230
58.63.236.239
58.63.236.237
58.63.236.248
121.14.1.189
121.14.1.190
121.14.1.190
……
安装dnsdict6
wget /releases/thc-ipv6-2.7.tar.gz
使用上面的命令会出现证书错误,在本机下载然后拖进虚拟,最后打开终端开始安装!
tar zvxf thc-ipv6-2.7.tar.gz
cd thc-ipv6-2.7
sudo apt-get install libpcap-dev libssl-dev
make
sudo cp dnsdict6 /usr/bin/
【课外拓展】说明: 用来枚举域服务器的,它使用你提供的一个字典或者内置的列表来枚举
语法:dnsdict6 [-d46] [-s|-m|-l|-x] [-t 线程] [-D] 域名 [字典路径]
参数说明:
-4 显示ipv4
-t 指定要使用的线程 默认:8 最大:32
-D =================[只显示字典不扫描]====
-d 显示在DNS服务器上的NS(一种服务记录类型)MX(邮件服务器) ipv6 的域名信息
-e 忽略没有NS域错误
-S 执行SRV服务名称猜测
-[smlx] 选择字典大小[内置的] -s 小型是50条 -m 中等是796条[默认] -l 大型1416条 -x 最大3211条
root@kali:~# dnsdict6 -d4 -t 16 -x //枚举域服务器,显示6行,线程16,最大,域名
Starting DNS enumeration work on . ...
Gathering NS and MX information...
NS of . is => 121.14.1.22
NS of . is . => 114.134.80.145
NS of . is . => 114.134.80.144
NS of . is . => 123.125.29.29
NS of . is => 61.172.201.254
NS of . is => 123.125.29.99
NS of . is => 202.106.184.166
NS of . is . => 61.172.201.254
No IPv6 address for NS entries found in DNS for domain .
MX of is freemx2. => 218.30.115.106
root@kali:~# dnsdict6 -h
dnsdict6 v2.7 (c) by van Hauser / THC <vh@>
Syntax: dnsdict6 [-d4] [-s|-m|-l|-x|-u] [-t THREADS] [-D] domain [dictionary-file]
Enumerates a domain for DNS entries, it uses a dictionary file if supplied
or a built-in list otherwise. This tool is based on dnsmap by .
Options:
-4 do also dump IPv4 addresses
-t NO specify the number of threads to use (default: 8, max: 32).
-D dump the selected built-in wordlist, no scanning.
-d display IPv6 information on NS and MX DNS domain information.
-e ignore no NS for domain errors
-S perform SRV service name guessing
-[smlxu] choose the dictionary size by -s(mall=100), -m(edium=1419) (DEFAULT)
-l(arge=2601), -x(treme=5886) or -u(ber=16724)
root@kali:~# dnsenum -f dnsbig.txt -dnsserver 8.8.8.8 -o sina.xml
dnsenum.pl VERSION:1.2.3
----- -----
Host's addresses:
__________________
.47 IN A 66.102.251.33
Name Servers:
______________
. 12328 IN A 61.172.201.254
. 21599 IN A 123.125.29.99
. 12449 IN A 202.106.184.166
. 21519 IN A 114.134.80.144
. 14250 IN A 61.172.201.254
. 20263 IN A 123.125.29.99
. 20931 IN A 114.134.80.145
. 15452 IN A 121.14.1.22
Mail (MX) Servers:
___________________
freemx2..167 IN A 218.30.115.106
freemx3..1194 IN A 60.28.2.248
freemx1..11 IN A 202.108.3.242
Trying Zone Transfers and getting Bind Versions:
_________________________________________________
Trying Zone Transfer for on ...
AXFR record query failed: connection failed
Trying Zone Transfer for on ...
AXFR record query failed: RCODE from server: REFUSED
Trying Zone Transfer for on ...
AXFR record query failed: connection failed
Trying Zone Transfer for on ...
AXFR record query failed: truncated zone transfer
Trying Zone Transfer for on ...
AXFR record query failed: connection failed
Trying Zone Transfer for on ...
AXFR record query failed: RCODE from server: REFUSED
Trying Zone Transfer for on ...
AXFR record query failed: connection failed
Trying Zone Transfer for on ...
AXFR record query failed: connection failed
Brute forcing with dnsbig.txt:
_______________________________
Error: make sure that the file dnsbig.txt exists and has a size greater than zero.
root@kali:~# dpkg -L dnsenum
/.
/usr
/usr/share
/usr/share/doc
/usr/share/doc/dnsenum
/usr/share/doc/dnsenum/README.md
/usr/share/doc/dnsenum/copyright
/usr/share/doc/dnsenum/changelog.Debian.gz
/usr/share/dnsenum
/usr/share/dnsenum/dns.txt
/usr/bin
/usr/bin/dnsenum
root@kali:~# dnsenum -f www -dnsserver 8.8.8.8 -o sina.xml
dnsenum.pl VERSION:1.2.3
----- -----
Host's addresses:
__________________
.14 IN A 66.102.251.33
Name Servers:
______________
13896 IN A 123.125.29.99
7721 IN A 202.106.184.166
4482 IN A 114.134.80.145
16316 IN A 123.125.29.99
177728 IN A 61.172.201.254
7274 IN A 114.134.80.144
root@kali:~# find / -name dnsenum
/usr/bin/dnsenum
/usr/share/doc/dnsenum
/usr/share/dnsenum
root@kali:~# dnsmap -w dns.txt
dnsmap 0.30 - DNS Network Mapper by pagvac ()
root@kali:~# dnsrecon -d --lifetime 10 -t brt -D dnsbig.txt
[-] File dnsbig.txt does not exist!
root@kali:~# dpkg -L dnsrecon
/.
/usr
/usr/share
/usr/share/man
/usr/share/man/man1
/usr/share/man/man1/dnsrecon.1.gz
/usr/share/doc
/usr/share/doc/dnsrecon
/usr/share/doc/dnsrecon/README.md.gz
/usr/share/doc/dnsrecon/copyright
/usr/share/doc/dnsrecon/changelog.Debian.gz
/usr/share/dnsrecon
/usr/share/dnsrecon/tools
/usr/share/dnsrecon/tools/parser.py
/usr/share/dnsrecon/lib
/usr/share/dnsrecon/lib/mdnsenum.py
/usr/share/dnsrecon/lib/__init__.py
/usr/share/dnsrecon/lib/dnshelper.py
/usr/share/dnsrecon/lib/msf_print.py
/usr/share/dnsrecon/lib/gooenum.py
/usr/share/dnsrecon/lib/whois.py
/usr/share/dnsrecon/namelist.txt
/usr/share/dnsrecon/msf_plugin
/usr/share/dnsrecon/msf_plugin/dnsr_import.rb
/usr/share/dnsrecon/dnsrecon.py
/usr/bin
/usr/bin/dnsrecon
root@kali:~# dnsrecon -d --lifetime 10 -t brt -D /usr/share/dnsrecon/namelist.txt
[*] Performing host and subdomain brute force against
[!] Wildcard resolution is enabled on this domain
[!] It is resolving to 202.102.110.204
[!] All queries will resolve to this address!!
[*] Do you wish to continue? y/n
y
[*] A 202.102.110.204
[*] A 202.102.110.204
[*] A 202.102.110.204
[*] A 202.102.110.204
[*] A 202.102.110.204
[*] A 202.102.110.204
[*] A 202.102.110.204
[*] A 202.102.110.204
[*] A 202.102.110.204
[*] A 202.102.110.204
[*] A 202.102.110.204
[*] A 202.102.110.204
[*] A 202.102.110.204
[*] CNAME region.sina.
[*] CNAME region.sina.
[*] A 14.0.35.230
[*] A 14.0.38.86
[*] A 202.102.110.204
[*] A 202.102.110.204
[*] A 202.102.110.204
[*] A 202.102.110.204
……
^C[-] You have pressed Ctrl-C. Saving found records.
[*] Waiting for 9 remaining threads to finish.
[*] A 202.102.110.204
[*] A 202.102.110.204
[*] A 202.102.110.204
[*] A 202.102.110.204
[*] A 202.102.110.204
[*] 254 Records Found
root@kali:~# dnsrecon -t std -d
[*] Performing General Enumeration of Domain:
Traceback (most recent call last):
File "./dnsrecon.py", line 1681, in <module>
main()
File "./dnsrecon.py", line 1524, in main
spf_enum, do_whois, zonewalk)
File "./dnsrecon.py", line 956, in general_enum
dns_sec_check(domain, res)
File "./dnsrecon.py", line 859, in dns_sec_check
answer = res._res.query(domain, 'DNSKEY')
File "/usr/lib/python2.7/dist-packages/dns/resolver.py", line 824, in query
raise NoNameservers
dns.resolver.NoNameservers
╋━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━╋
┃DNS注册信息 ┃
┃Whois ┃
┃Whois -h 192.0.43.10 ┃
┃ ┃
┃AFRINIC ┃
┃APNIC ┃
┃ARIN┃
┃IANA ┃
┃ICANN ┃
┃LACNIC ┃
┃NRO ┃
┃RIPE ┃
┃InterNic ┃
╋━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━╋
root@kali:~# whois
Whois Server Version 2.0
Domain names in the .com and .net domains can now be registered
with many different competing registrars. Go to
for detailed information.
Server Name:
Registrar: ENOM, INC.
Whois Server:
Referral URL:
Domain Name:
Registrar: NETWORK SOLUTIONS, LLC.
Sponsoring Registrar IANA ID: 2
Whois Server:
Referral URL:
Name Server:
Name Server:
Name Server:
Name Server:
Name Server:
Name Server:
Name Server:
Status: clientTransferProhibited /epp#clientTransferProhibited
Updated Date: 26-nov-
Creation Date: 16-sep-1998
Expiration Date: 15-sep-
>>> Last update of whois database: Fri, 18 Sep 16:00:27 GMT <<<
NOTICE: The expiration date displayed in this record is the date the
registrar's sponsorship of the domain name registration in the registry is
currently set to expire. This date does not necessarily reflect the expiration
date of the domain name registrant's agreement with the sponsoring
registrar. Users may consult the sponsoring registrar's Whois database to
view the registrar's reported date of expiration for this registration.
TERMS OF USE: You are not authorized to access or query our Whois
database through the use of electronic processes that are high-volume and
automated except as reasonably necessary to register domain names or
modify existing registrations; the Data in VeriSign Global Registry
Services' ("VeriSign") Whois database is provided by VeriSign for
information purposes only, and to assist persons in obtaining information
about or related to a domain name registration record. VeriSign does not
guarantee its accuracy. By submitting a Whois query, you agree to abide
by the following terms of use: You agree that you may use this Data only
for lawful purposes and that under no circumstances will you use this Data
to: (1) allow, enable, or otherwise support the transmission of mass
unsolicited, commercial advertising or solicitations via e-mail, telephone,
or facsimile; or (2) enable high volume, automated, electronic processes
that apply to VeriSign (or its computer systems). The compilation,
repackaging, dissemination or other use of this Data is expressly
prohibited without the prior written consent of VeriSign. You agree not to
use electronic processes that are automated and high-volume to access or
query the Whois database except as reasonably necessary to register
domain names or modify existing registrations. VeriSign reserves the right
to restrict your access to the Whois database in its sole discretion to ensure
operational stability. VeriSign may restrict or terminate your access to the
Whois database for failure to abide by these terms of use. VeriSign
reserves the right to modify these terms at any time.
The Registry database contains ONLY .COM, .NET, .EDU domains and
Registrars.
For more information on Whois status codes, please visit
/resources/pages/epp-status-codes--06-16-en.
Domain Name:
Registry Domain ID: 2243615_DOMAIN_COM-VRSN
Registrar WHOIS Server:
Registrar URL:
Updated Date: -01-28T23:23:26Z
Creation Date: 1998-09-16T04:00:00Z
Registrar Registration Expiration Date: -09-15T04:00:00Z
Registrar: NETWORK SOLUTIONS, LLC.
Registrar IANA ID: 2
Registrar Abuse Contact Email: abuse@
Registrar Abuse Contact Phone: +1.8003337680
Reseller:
Domain Status: clientTransferProhibited /epp#clientTransferProhibited
Registry Registrant ID:
Registrant Name: TECHNOLOGY(CHINA)CO.,LTD
Registrant Organization: TECHNOLOGY(CHINA)CO.,LTD
Registrant Street: BEIJING IDEAL PLAZA,20F NO.58
Registrant City: beijing
Registrant State/Province: CN
Registrant Postal Code: 100080
Registrant Country: CN
Registrant Phone: +86.1058983009
Registrant Phone Ext:
Registrant Fax: +86.1082607527
Registrant Fax Ext:
Registrant Email: domainname@
Registry Admin ID:
Admin Name: Xie, Guomin
Admin Organization: TECHNOLOGY(CHINA)CO.,LTD
Admin Street: BEIJING IDEAL PLAZA,20F NO.58
Admin City: beijing
Admin State/Province: CN
Admin Postal Code: 100080
Admin Country: CN
Admin Phone: +86.1058983078
Admin Phone Ext:
Admin Fax: +86.1082607527
Admin Fax Ext:
Admin Email: domainname@
Registry Tech ID:
Tech Name: Xie, Guomin
Tech Organization: TECHNOLOGY(CHINA)CO.,LTD
Tech Street: BEIJING IDEAL PLAZA,20F NO.58
Tech City: beijing
Tech State/Province: CN
Tech Postal Code: 100080
Tech Country: CN
Tech Phone: +86.1058983078
Tech Phone Ext:
Tech Fax: +86.1082607527
Tech Fax Ext:
Tech Email: domainname@
Name Server:
Name Server:
Name Server:
Name Server:
Name Server:
Name Server:
Name Server:
DNSSEC: Unsigned
URL of the ICANN WHOIS Data Problem Reporting System: /
>>> Last update of whois database: Fri, 18 Sep 16:00:27 GMT <<<
The data in 's WHOIS database is provided to you by
for information purposes only, that is, to assist you in
obtaining information about or related to a domain name registration
record. makes this information available "as is," and
does not guarantee its accuracy. By submitting a WHOIS query, you
agree that you will use this data only for lawful purposes and that,
under no circumstances will you use this data to: (1) allow, enable,
or otherwise support the transmission of mass unsolicited, commercial
advertising or solicitations via direct mail, electronic mail, or by
telephone; or (2) enable high volume, automated, electronic processes
that apply to (or its systems). The compilation,
repackaging, dissemination or other use of this data is expressly
prohibited without the prior written consent of .
reserves the right to modify these terms at any time.
By submitting this query, you agree to abide by these terms.
root@kali:~# whois
Domain Name:
Domain ID: D159099935-LROR
Creation Date: -05-06T08:50:48Z
Updated Date: -01-07T03:37:41Z
Registry Expiry Date: 2024-05-06T08:50:48Z
Sponsoring Registrar:Hichina Zhicheng Technology Limited (R1373-LROR)
Sponsoring Registrar IANA ID: 420
WHOIS Server:
Referral URL:
Domain Status: clientDeleteProhibited -- /epp#clientDeleteProhibited
Domain Status: clientTransferProhibited -- /epp#clientTransferProhibited
Registrant ID:hc556860480-cn
Registrant Name:Fang Xiao Dun
Registrant Organization:Fang Xiao Dun
Registrant Street: Haidian District JuYuan Road 6# 502
Registrant City:Beijing
Registrant State/Province:Beijing
Registrant Postal Code:100080
Registrant Country:CN
Registrant Phone:+86.18610137578
Registrant Phone Ext:
Registrant Fax: +86.18610137578
Registrant Fax Ext:
Registrant Email:xssshell@
Admin ID:HC-009652962-CN
Admin Name:Fang Xiaodun
Admin Organization:Beijing Bigfish Technology
Admin Street: Haidian District JuYuan Road 6# 502
Admin City:Beijing
Admin State/Province:Beijing
Admin Postal Code:100080
Admin Country:CN
Admin Phone:+86.18610137578
Admin Phone Ext:
Admin Fax: +86.18610137578
Admin Fax Ext:
Admin Email:xssshell@
Tech ID:HC-844637505-CN
Tech Name:Fang Xiaodun
Tech Organization:Beijing Bigfish Technology
Tech Street: Haidian District JuYuan Road 6# 502
Tech City:Beijing
Tech State/Province:Beijing
Tech Postal Code:100080
Tech Country:CN
Tech Phone:+86.18610137578
Tech Phone Ext:
Tech Fax: +86.18610137578
Tech Fax Ext:
Tech Email:xssshell@
Name Server:
Name Server:
Name Server:
Name Server:
Name Server:
Name Server:
Name Server:
Name Server:
Name Server:
Name Server:
Name Server:
Name Server:
Name Server:
DNSSEC:Unsigned
Access to Public Interest Registry WHOIS information is provided to assist persons in determining the contents of a domain name registration record in the Public Interest Registry registry database. The data in this record is provided by Public Interest Registry for informational purposes only, and Public Interest Registry does not guarantee its accuracy. This service is intended only for query-based access. You agree that you will use this data only for lawful purposes and that, under no circumstances will you use this data to(a) allow, enable, or otherwise support the transmission by e-mail, telephone, or facsimile of mass unsolicited, commercial advertising or solicitations to entities other than the data recipient's own existing customers; or (b) enable high volume, automated, electronic processes that send queries or data to the systems of Registry Operator, a Registrar, or Afilias except as reasonably necessary to register domain names or modify existing registrations. All rights reserved. Public Interest Registry reserves the right to modify these terms at any time. By submitting this query, you agree to abide by this policy. For more information on Whois status codes, please visit /resources/pages/epp-status-codes--06-16-en.
root@kali:~# whois
Whois Server Version 2.0
Domain names in the .com and .net domains can now be registered
with many different competing registrars. Go to
for detailed information.
Server Name: .AR
Registrar: ENOM, INC.
Whois Server:
Referral URL:
Server Name: .AU
Registrar: MELBOURNE IT, LTD. D/B/A INTERNET NAMES WORLDWIDE
Whois Server:
Referral URL:
Server Name: .BR
Registrar: ENOM, INC.
Whois Server:
Referral URL:
Server Name: .CO
Registrar: ENOM, INC.
Whois Server:
Referral URL:
Server Name: .DO
Registrar: ENOM, INC.
Whois Server:
Referral URL:
Server Name: .
IP Address: 8.8.4.4
IP Address: 8.8.8.8
IP Address: 2001:4860:4860:0:0:0:0:8844
IP Address: 2001:4860:4860:0:0:0:0:8888
Registrar: GOOGLE INC.
Whois Server:
Referral URL:
Server Name: .HK
Registrar: , INC.
Whois Server:
Referral URL:
Server Name: .INFO-
IP Address: 216.239.32.21
IP Address: 216.239.38.21
IP Address: 216.239.36.21
IP Address: 216.239.34.21
Registrar: , LLC
Whois Server:
Referral URL:
Server Name: .MX
Registrar: ENOM, INC.
Whois Server:
Referral URL:
Server Name: .
IP Address: 216.239.32.21
IP Address: 216.239.34.21
IP Address: 216.239.36.21
IP Address: 216.239.38.21
Registrar: , LLC
Whois Server:
Referral URL:
Server Name: .PE
Registrar: DELUXE SMALL BUSINESS SALES, INC. D/B/A
Whois Server:
Referral URL:
Server Name: .PK
Registrar: INTERNET.BS CORP.
Whois Server: whois.internet.bs
Referral URL: http://www.internet.bs
Server Name: .SA
Registrar: OMNIS NETWORK, LLC
Whois Server:
Referral URL:
Server Name: .TR
Registrar: TUCOWS DOMAINS INC.
Whois Server:
Referral URL:
Server Name: .TW
Registrar: ENOM, INC.
Whois Server:
Referral URL:
Server Name: .VN
Registrar: ENOM, INC.
Whois Server:
Referral URL:
>>> Last update of whois database: Fri, 18 Sep 16:10:03 GMT <<<
NOTICE: The expiration date displayed in this record is the date the
registrar's sponsorship of the domain name registration in the registry is
currently set to expire. This date does not necessarily reflect the expiration
date of the domain name registrant's agreement with the sponsoring
registrar. Users may consult the sponsoring registrar's Whois database to
view the registrar's reported date of expiration for this registration.
TERMS OF USE: You are not authorized to access or query our Whois
database through the use of electronic processes that are high-volume and
automated except as reasonably necessary to register domain names or
modify existing registrations; the Data in VeriSign Global Registry
Services' ("VeriSign") Whois database is provided by VeriSign for
information purposes only, and to assist persons in obtaining information
about or related to a domain name registration record. VeriSign does not
guarantee its accuracy. By submitting a Whois query, you agree to abide
by the following terms of use: You agree that you may use this Data only
for lawful purposes and that under no circumstances will you use this Data
to: (1) allow, enable, or otherwise support the transmission of mass
unsolicited, commercial advertising or solicitations via e-mail, telephone,
or facsimile; or (2) enable high volume, automated, electronic processes
that apply to VeriSign (or its computer systems). The compilation,
repackaging, dissemination or other use of this Data is expressly
prohibited without the prior written consent of VeriSign. You agree not to
use electronic processes that are automated and high-volume to access or
query the Whois database except as reasonably necessary to register
domain names or modify existing registrations. VeriSign reserves the right
to restrict your access to the Whois database in its sole discretion to ensure
operational stability. VeriSign may restrict or terminate your access to the
Whois database for failure to abide by these terms of use. VeriSign
reserves the right to modify these terms at any time.
The Registry database contains ONLY .COM, .NET, .EDU domains and
Registrars.
For more information on Whois status codes, please visit
/resources/pages/epp-status-codes--06-16-en.
root@kali:~# whois 202.106.0.20
% []
% Whois data copyright terms /db/dbcopyright.html
% Information related to '202.106.0.0 - 202.106.255.255'
inetnum: 202.106.0.0 - 202.106.255.255
netname: UNICOM-BJ
descr:China Unicom Beijing province network
descr:China Unicom
country: CN
admin-c: CH1302-AP
tech-c: SY21-AP
mnt-by: APNIC-HM
mnt-lower: MAINT-CNCGROUP-BJ
mnt-routes: MAINT-CNCGROUP-RR
mnt-irt: IRT-CU-CN
changed: hm-changed@ 1017
status: ALLOCATED PORTABLE
changed: hm-changed@ 0124
changed: hm-changed@ 0507
changed: hm-changed@ 0508
source: APNIC
irt:IRT-CU-CN
address: No.21,Jin-Rong Street
address: Beijing,100140
address: P.R.China
e-mail: zhouxm@
abuse-mailbox: zhouxm@
admin-c: CH1302-AP
tech-c: CH1302-AP
auth:# Filtered
mnt-by: MAINT-CNCGROUP
changed: zhouxm@ 1110
changed: hm-changed@ 1116
source: APNIC
person: ChinaUnicom Hostmaster
nic-hdl: CH1302-AP
e-mail: abuse@cnc-
address: No.21,Jin-Rong Street
address: Beijing,100033
address: P.R.China
phone:+86-10-66259764
fax-no: +86-10-66259764
country: CN
changed: abuse@cnc- 0408
mnt-by: MAINT-CNCGROUP
source: APNIC
person: sun ying
address: fu xing men nei da jie 97, Xicheng District
address: Beijing 100800
country: CN
phone:+86-10-66030657
fax-no: +86-10-66078815
e-mail: hostmast@.cn
nic-hdl: SY21-AP
mnt-by: MAINT-CNCGROUP-BJ
changed: suny@.cn 19980824
changed: hm-changed@ 0717
changed: hostmast@.cn 0630
source: APNIC
% This query was served by the APNIC Whois Service version 1.69.1-APNICv1r6 (WHOIS1)
该笔记为安全牛课堂学员笔记,想看此课程或者信息安全类干货可以移步到安全牛课堂
Security+认证为什么是互联网+时代最火爆的认证?
牛妹先给大家介绍一下Security+
Security+ 认证是一种中立第三方认证,其发证机构为美国计算机行业协会CompTIA ;是和CISSP、ITIL 等共同包含在内的国际 IT 业 10 大热门认证之一,和CISSP偏重信息安全管理相比,Security+ 认证更偏重信息安全技术和操作。
通过该认证证明了您具备网络安全,合规性和操作安全,威胁和漏洞,应用程序、数据和主机安全,访问控制和身份管理以及加密技术等方面的能力。因其考试难度不易,含金量较高,目前已被全球企业和安全专业人士所普遍采纳。
Security+认证如此火爆的原因?
原因一:在所有信息安全认证当中,偏重信息安全技术的认证是空白的,Security+认证正好可以弥补信息安全技术领域的空白 。
目前行业内受认可的信息安全认证主要有CISP和CISSP,但是无论CISP还是CISSP都是偏重信息安全管理的,技术知识讲的宽泛且浅显,考试都是一带而过。而且CISSP要求持证人员的信息安全工作经验都要5年以上,CISP也要求大专学历4年以上工作经验,这些要求无疑把有能力且上进的年轻人的持证之路堵住。在现实社会中,无论是找工作还是升职加薪,或是投标时候报人员,认证都是必不可少的,这给年轻人带来了很多不公平。而Security+的出现可以扫清这些年轻人职业发展中的障碍,由于Security+偏重信息安全技术,所以对工作经验没有特别的要求。只要你有IT相关背景,追求进步就可以学习和考试。
原因二:IT运维人员工作与翻身的利器。
在银行、证券、保险、信息通讯等行业,IT运维人员非常多,IT运维涉及的工作面也非常广。是一个集网络、系统、安全、应用架构、存储为一体的综合性技术岗。虽然没有程序猿们“生当做光棍,死亦写代码”的悲壮,但也有着“锄禾日当午,不如运维苦“的感慨。天天对着电脑和机器,时间长了难免有对于职业发展的迷茫和困惑。Security+国际认证的出现可以让有追求的IT运维人员学习网络安全知识,掌握网络安全实践。职业发展朝着网络安全的方向发展,解决国内信息安全人才的匮乏问题。另外,即使不转型,要做好运维工作,学习安全知识取得安全认证也是必不可少的。
原因三:接地气、国际范儿、考试方便、费用适中!
CompTIA作为全球ICT领域最具影响力的全球领先机构,在信息安全人才认证方面是专业、公平、公正的。Security+认证偏重操作且和一线工程师的日常工作息息相关。适合银行、证券、保险、互联网公司等IT相关人员学习。作为国际认证在全球147个国家受到广泛的认可。
在目前的信息安全大潮之下,人才是信息安全发展的关键。而目前国内的信息安全人才是非常匮乏的,相信Security+认证一定会成为最火爆的信息安全认证。
近期,安全牛课堂在做此类线上培训,感兴趣可以了解