Sophie Chen
ResumeLinkedInGitHubBluesky
Work
Work
  • Work
  • Digital Forensics Lab
    • 1 Setting Up
    • 2 Basic Computer Skills for Digital Forensics
      • 2.1 Number Systems
      • 2.2 PC Introduction
      • 2.3 Windows Command Line Tutorial
      • 2.4 Linux Command Line Tutorial
      • 2.5 Advanced Linux Command Line Tutorial
    • 3 Basic Networking Skills for Digital Forensics
      • 3.1 HTTP Analysis using Wireshark 1
      • 3.2 HTTP Analysis using Wireshark 2
      • 3.3 SYN Flood Attack Investigation using tshark
      • 3.4 SMTP Forensics
      • 3.5 ARP Poisoning Forensics
      • 3.6 Firewall
      • 3.7 DNS Introduction
      • 3.8 DNS Spoofing Forensics
      • 3.9 WEP40 Wireless Aircrack
    • 4 Computer and Digital Forensics
      • 4.1 Introduction to Digital Forensics
      • 4.2 Sleuth Kit Tutorial
      • 4.3 USB Image Acquisition
      • 4.4 Evidence Search - A Pattern Match Game
      • 4.5 Evidence Search - File Metadata
      • 4.6 Data Carving
      • 4.7 Steganography
      • 4.8 Forensic Report Template
    • 5 Computer Forensics Case Studies
      • 5.1 Investigating NIST Data Leakage
        • 5.1.1 Environment Setting Up
        • 5.1.2 Windows Registry
        • 5.1.3 Windows Event and XML
        • 5.1.4 Web History and SQL
        • 5.1.5 Email Investigation
        • 5.1.6 File Change History and USN Journal
        • 5.1.7 Network Evidence and shellbag
        • 5.1.8 Network Drive and Cloud
        • 5.1.9 Master File Table ($MFT) and Log File ($logFile) Analysis
        • 5.1.10 Windows Search History
        • 5.1.11 Windows Volume Shadow Copy Analysis/SQL database carving
        • 5.1.12 Recycle Bin and Anti-Forensics
        • 5.1.13 Data Carving
        • 5.1.14 Crack Windows Passwords
      • 5.2 Investigating P2P Data Leakage
        • 5.2.1 Lab Environment Setting Up
        • 5.2.2 Disk Image and Partitions
        • 5.2.3 Windows Registry and File Directory
        • 5.2.4 MFT Timeline
        • 5.2.5 USN Journal Timeline
        • 5.2.6 uTorrent Log File
        • 5.2.7 File Signature
        • 5.2.8 Emails
        • 5.2.9 Web History
        • 5.2.10 Website Analysis
        • 5.2.11 Timeline (Summary)
      • 5.3 Investigating Illegal Possession of Images
        • 5.3.1 Review HTTP Analysis using Wireshark (text)
        • 5.3.2 Rhion Possession Investigation 1: File recovering
        • 5.3.3 Rhion Possession Investigation 2: Steganography
        • 5.3.4 Rhion Possession Investigation 3: Extract Evidence from FTP Traffic
        • 5.3.5 Rhion Possession Investigation 4: Extract Evidence from HTTP Traffic
      • 5.4 Investigating Email Harassment
        • 5.4.1 Investigating Harassment Email using Wireshark
        • 5.4.2 t-shark Forensic Introduction
        • 5.4.3 Investigating Harassment Email using t-shark
      • 5.5 Investigating Illegal File Transferring
      • 5.6 Investigating Hacking Case
      • 5.7 Investigating Morris Worm Attack
        • 5.7.1 Morris Worm Attack
        • 5.7.2 Investigating Morris Worm Attack
    • 6 Mobile/IoT Forensics Case Studies
      • 6.1 Investigating Echo Show 8
        • 6.1.1 Echo Show Introduction
        • 6.1.2 Echo Show Evidence Planting
        • 6.1.3 Device Teardown and eMMC Chip-off
        • 6.1.4 Image Acquisition and Mounting
        • 6.1.5 Specifications: Device and OS Info
        • 6.1.6 Specifications: User Info
        • 6.1.7 Specifications: Network Connectivity Info
        • 6.1.8 Web Activity
        • 6.1.9 Phone Communication
        • 6.1.10 Multimedia: Photos and related Data
        • 6.1.11 Multimedia: Videos and related Data
        • 6.1.12 Multimedia: Audio and related Data
      • 6.2 Investigating Android 10
        • 6.2.1 Intro Pixel 3
        • 6.2.2 Pixel 3 Image
        • 6.2.3 Pixel 3 Device
        • 6.2.4 Pixel 3 System Setting
        • 6.2.5 Overview: App Life Cycle
        • 6.2.6 AOSP App Investigations: Messaging
        • 6.2.7 AOSP App Investigations: Contacts
        • 6.2.8 AOSP App Investigations: Calendar
        • 6.2.9 GMS App Investigations: Messaging
        • 6.2.10 GMS App Investigations: Dialer
        • 6.2.11 GMS App Investigations: Maps
        • 6.2.12 GMS App Investigations: Photos
        • 6.2.13 Third-Party App Investigations: Kik
        • 6.2.14 Third-Party App Investigations: textnow
        • 6.2.15 Third-Party App Investigations: whatapp
        • 6.2.16 Pixel 3 Rooting
      • 6.3 Investigating iPhone iOS 13.4.1
        • 6.3.1 Intro Intro iPhone iOS 13
        • 6.3.2 iOS 13.4.1 Image
        • 6.3.3 iPhone Device Investigation
        • 6.3.4 iOS System Settings
        • 6.3.5 Overview of App Life Cycle
        • 6.3.6 Messages Investigations
        • 6.3.7 Contacts Investigations
        • 6.3.8 Calendar Investigations
        • 6.3.9 Safari Investigations
        • 6.3.10 Photo Investigations
        • 6.3.11 KnowledgeC Investigations
        • 6.3.12 Health Investigations
        • 6.3.13 Location Investigations
        • 6.3.14 Cellebrite Investigations
        • 6.3.15 Magnet Axiom Investigations
        • 6.3.16 Jailbreak Investigations
      • 6.4 Investigating Drone DJI
        • 6.4.1 DJI Mavic Air Mobile
        • 6.4.2 DJI Mavic Air MicroSD Raw
        • 6.4.3 DJI Mavic Air MicroSD Encase Format
  • CTF Walkthroughs
    • Hack The Box
      • Linux Fundamentals
      • Windows Fundamentals
    • TryHackMe
      • Linux Fundamentals Part 1
      • Linux Fundamentals Part 2
      • Linux Fundamentals Part 3
      • Introductory Networking
      • HTTP in Detail
      • DNS in Detail
      • Intro to Cyber Threat Intel
      • Threat Intelligence Tools
      • MAL: Malware Introductory
      • Intro to Digital Forensics
      • Digital Forensics Case B4DM755
  • Multithreaded Network File Server
  • Thread Library
  • Virtual Memory Pager
Powered by GitBook
On this page
  • Task 1: What is DNS?
  • Task 2: Domain Hierarchy
  • Task 3: Record Types
  • Task 4: Making A Request
  • Task 5: Practical
  1. CTF Walkthroughs
  2. TryHackMe

DNS in Detail


Task 1: What is DNS?

Devices on the Internet are identified with an address called an IP address. IP addresses, such as 104.26.10.229, can be difficult to remember. To make IP addresses more friendly to humans, we use a protocol called the Domain Name System (DNS). DNS translates between IP addresses and domain names, such as tryhackme.com, and allows us to communicate with devices more seamlessly.

What does DNS stand for?

Domain Name System

The Domain Name System protocol allows us to use easy-to-remember names to communicate with devices on the Internet.

Task 2: Domain Hierarchy

A domain can be split into different levels. Consider the domain https://feodotracker.abuse.ch.

  • .ch: This is the top-level domain (TLD).

    • TLDs can be generic TLDs (gTLD) or country code TLDs (ccTLD).

  • abuse: This is a second-level domain.

    • Second-level domains are limited to 63 characters.

    • Second-level domains can only use the characters a-z, 0-9, and hyphens.

  • feodotracker: This is a subdomain.

    • The subdomain is separated from the second-level domain by a period.

    • Subdomains have the same restrictions as a second-level domain.

    • A domain can have multiple subdomains as long as the entire domain name is 253 characters or less.

What is the maximum length of a subdomain?

63

A subdomain name has the same creation restrictions as a Second-Level Domain, which is limited to 63 characters.

Which of the following characters cannot be used in a subdomain ( 3 b _ - )?

_

A subdomain can only use the characters a-z, 0-9, and hyphens.

What is the maximum length of a domain name?

253

A domain name is limited to 253 characters or less.

What type of TLD is .co.uk?

ccTLD

ccTLD stands for country code top-level domain.

Task 3: Record Types

There are many types of DNS records.

  • A: These records resolve IPv4 addresses.

  • AAAA: These records resolve IPv6 addresses.

  • CNAME: These records resolve another domain name.

  • MX: These records resolve to the address of the servers that handle the email for the domain being queried

  • TXT: These records are free text fields where any text-based data can be stored.

    • TXT records are commonly used to verify domain ownership and list authoritative servers.

What type of record would be used to advise where to send email?

MX

The server that handles email for a specific domain can be found using an MX record.

What type of record handles IPv6 addresses?

AAAA

AAAA records resolve IPv6 addresses.

Task 4: Making A Request

When a DNS request is made, the following steps occur:

  1. The computer checks its cache to see if the address has been looked up recently. If the address is not in the cache, a request to the computer's Recursive DNS Server is made.

  2. The recursive DNS server, usually provided by an ISP, checks its cache for the address. to send back to the computer. If the address is not in the cache, then root servers are queried.

  3. The root server directs the computer to the correct Top Level Domain Server.

  4. The TLD server holds records for where to find the authoritative server, or nameserver, to answer the DNS request.

  5. The authoritative server is responsible for storing the DNS records for a particular domain name. THe DNS record may also be sent back to the Recursive DNS server in order to be cached for a certain amount time, specified by the record's time-to-live (TTL) value.

What field specifies how long a DNS record should be cached for?

TTL

TTL stands for time-to-live (ie how much time the DNS record should live in cache).

What type of DNS Server is usually provided by your ISP?

recursive

A recursive DNS server is usually provided by the ISP. A recursive DNS server will check its cache for an address before going to a root server to seek out an answer.

What type of server holds all the records for a domain?

authoritative

An authoritative server is also known as the nameserver for a domain and holds all of that domain's records.

Task 5: Practical

Open the site associated with the task to answer the following questions.

What is the CNAME of shop.website.thm?

shops.myshopify.com

Change the DNS type to CNAME and add "shop" as the subdomain. Then, send a DNS request.

What is the value of the TXT record of website.thm?

THM{7012BBA60997F35A9516C2E16D2944FF}

Change the DNS type to TXT. Then, send a DNS request.

What is the numerical priority value for the MX record?

30

Change the DNS type to MX. Then, send a DNS request.

What is the IP address for the A record of www.website.thm?

10.10.10.10

Change the DNS type to A. Then, send a DNS request.


Last updated 4 months ago

⋅ ⋅

Work
Home
Thoughts