@@ -183,6 +183,140 @@ dig google.com A @<IP>
183183
184184![ ] ( < ../images/image (146).png > )
185185
186+ ### DNS Auditor checks (HackTricks tools)
187+
188+ The HackTricks Domain/DNS auditor was expanded with extra DNS/certificate checks.
189+ Use this as a quick manual reference for verification and abuse paths.
190+
191+ #### NS delegation integrity / lame delegation
192+
193+ ** What it checks**
194+ - Delegated NS hostnames resolve to IPs
195+ - Delegated NSs answer authoritatively for the zone
196+ - SOA serial consistency across authoritative NSs
197+
198+ ** How to check**
199+ ``` bash
200+ dig example.com NS +short
201+ for ns in $( dig +short example.com NS) ; do dig @${ns% ?} example.com SOA +short; done
202+ ```
203+
204+ ** Impact**
205+ - Intermittent or full DNS outages
206+ - Stale records depending on which NS a resolver hits
207+
208+ ** Attacker abuse**
209+ - Exploit lame/out-of-sync delegation to increase reliability of cache-poisoning windows and selective traffic disruption.
210+
211+ #### HTTPS/SVCB modern records
212+
213+ ** What it checks**
214+ - Presence/absence of ` HTTPS ` and ` SVCB ` records on apex and ` www `
215+
216+ ** How to check**
217+ ``` bash
218+ dig example.com HTTPS +short
219+ dig example.com SVCB +short
220+ dig www.example.com HTTPS +short
221+ dig www.example.com SVCB +short
222+ ```
223+
224+ ** Impact**
225+ - Mostly hardening/operational maturity gap (less protocol steering, less explicit service binding)
226+
227+ ** Attacker abuse**
228+ - Not usually direct exploitation, but can reduce defensive control over client connection behavior.
229+
230+ #### DNS EDNS + TCP fallback resilience
231+
232+ ** What it checks**
233+ - Truncation handling and TCP fallback viability for large DNS/DNSSEC answers
234+
235+ ** How to check**
236+ ``` bash
237+ dig example.com DNSKEY +dnssec +bufsize=1232
238+ dig example.com DNSKEY +dnssec +tcp
239+ ```
240+
241+ ** Impact**
242+ - DNSSEC breakage, intermittent resolution failures behind specific networks/firewalls
243+
244+ ** Attacker abuse**
245+ - Trigger degraded availability by forcing large responses where TCP/53 is blocked or broken.
246+
247+ #### DNSSEC lifecycle (CDS/CDNSKEY + DS consistency)
248+
249+ ** What it checks**
250+ - Presence of rollover signaling records (` CDS ` , ` CDNSKEY ` )
251+ - Parent/child key-tag consistency (` DS ` vs ` CDS ` )
252+
253+ ** How to check**
254+ ``` bash
255+ dig example.com DS +short
256+ dig example.com CDS +short
257+ dig example.com CDNSKEY +short
258+ ```
259+
260+ ** Impact**
261+ - Broken key rollover -> validation failures / SERVFAIL for validating resolvers
262+
263+ ** Attacker abuse**
264+ - Abuse mis-rolled states to create denial-of-service conditions for DNSSEC-validating clients.
265+
266+ #### DNSSEC negative trust validation (NXDOMAIN proofs)
267+
268+ ** What it checks**
269+ - For signed zones, whether random NXDOMAIN responses are validated and carry denial-of-existence evidence
270+
271+ ** How to check**
272+ ``` bash
273+ dig @8.8.8.8 _random-does-not-exist.example.com A +dnssec
274+ dig @8.8.8.8 _random-does-not-exist.example.com A +dnssec +multi
275+ ```
276+
277+ ** Impact**
278+ - Broken denial-of-existence behavior can indicate chain/signer inconsistencies
279+
280+ ** Attacker abuse**
281+ - Increase probability of resolver-side failure states during targeted DNSSEC disruption attempts.
282+
283+ #### Very low TTL on critical records
284+
285+ ** What it checks**
286+ - Low/very-low TTLs on ` A ` , ` AAAA ` , ` MX ` , ` NS `
287+
288+ ** How to check**
289+ ``` bash
290+ dig example.com A +ttlid
291+ dig example.com AAAA +ttlid
292+ dig example.com MX +ttlid
293+ dig example.com NS +ttlid
294+ ```
295+
296+ ** Impact**
297+ - Faster global propagation of accidental or malicious DNS changes
298+
299+ ** Attacker abuse**
300+ - If attacker gets brief write access to DNS, low TTL accelerates malicious redirection rollout.
301+
302+ #### CAA policy quality + CT correlation
303+
304+ ** What it checks**
305+ - ` issue ` / ` issuewild ` breadth and over-permissive CA authorization
306+ - Whether observed CT issuers are consistent with CAA intent (heuristic)
307+
308+ ** How to check**
309+ ``` bash
310+ dig example.com CAA +short
311+ curl -s " https://crt.sh/?q=%25.example.com&output=json" | head
312+ ```
313+
314+ ** Impact**
315+ - Overly broad or inconsistent issuance policy increases cert abuse surface
316+
317+ ** Attacker abuse**
318+ - Mis-scoped CAA can make unauthorized/abusive cert issuance easier after CA/process compromise.
319+
186320
187321### Mail to nonexistent account
188322
@@ -267,4 +401,3 @@ Entry_6:
267401{{#include ../banners/hacktricks-training.md}}
268402
269403
270-
0 commit comments