What did the hacker accomplish?

Look at the following output. What did the hacker accomplish?
; <<>> DiG 9.7.-P1 <<>> axfr domam.com @192.168.1.105
;; global options: +cmd
domain.com. 3600 IN SOA srv1.domain.com. hostsrv1.domain.com. 131 900 600 86400 3600 domain.com. 600 IN A 192.168.1.102 domain.com. 600 IN A 192.168.1.105 domain.com. 3600 IN NS srv1.domain.com. domain.com. 3600 IN NS srv2.domain.com. vpn.domain.com. 3600 IN A 192.168.1.1 server.domain.com. 3600 IN A 192.168.1.3 office.domain.com. 3600 IN A 192.168.1.4 remote.domain.com. 3600 IN A 192.168. 1.48 support.domain.com. 3600 IN A 192.168.1.47 ns1.domain.com. 3600 IN A 192.168.1.41 ns2.domain.com. 3600 IN A 192.168.1.42 ns3.domain.com. 3600 IN A 192.168.1.34 ns4.domain.com. 3600 IN A 192.168.1.45 srv1.domain.com. 3600 IN A 192.168.1.102 srv2.domain.com. 1200 IN A 192.168.1.105
domain.com. 3600 INSOA srv1.domain.com. hostsrv1.domain.com. 131 900 600 86400 3600 ;; Query time: 269 msec
;; SERVER: 192.168.1.105#53(192.168.1.105) ;; WHEN: Sun Aug 11 20:07:59 2013
;; XFR size: 65 records (messages 65, bytes 4501)
A. The hacker used whois to gather publicly available records for the domain.
B. The hacker used the "fierce" tool to brute force the list of available domains.
C. The hacker listed DNS records on his own domain.
D. The hacker successfully transfered the zone and enumerated the hosts.

EC-Council Certified Ethical Hacker v11

Free dumps for 312-50v11 in Printable PDF format.

High quality PDF and software. VALID exam to help you pass.

Download Printable PDF. VALID exam to help you PASS.

3 thoughts on “What did the hacker accomplish?

  1. Formatted:

    Look at the following output. What did the hacker accomplish?
    ; <> DiG 9.7.-P1 <> axfr domam.com @192.168.1.105
    ;; global options: +cmd
    domain.com. 3600 IN SOA srv1.domain.com. hostsrv1.domain.com. 131 900 600 86400 3600
    domain.com. 600 IN A 192.168.1.102
    domain.com. 600 IN A 192.168.1.105
    domain.com. 3600 IN NS srv1.domain.com.
    domain.com. 3600 IN NS srv2.domain.com.
    vpn.domain.com. 3600 IN A 192.168.1.1
    server.domain.com. 3600 IN A 192.168.1.3
    office.domain.com. 3600 IN A 192.168.1.4
    remote.domain.com. 3600 IN A 192.168. 1.48
    support.domain.com. 3600 IN A 192.168.1.47
    ns1.domain.com. 3600 IN A 192.168.1.41
    ns2.domain.com. 3600 IN A 192.168.1.42
    ns3.domain.com. 3600 IN A 192.168.1.34
    ns4.domain.com. 3600 IN A 192.168.1.45
    srv1.domain.com. 3600 IN A 192.168.1.102
    srv2.domain.com. 1200 IN A 192.168.1.105
    domain.com. 3600 INSOA srv1.domain.com. hostsrv1.domain.com. 131 900 600 86400 3600
    ;; Query time: 269 msec
    ;; SERVER: 192.168.1.105#53(192.168.1.105)
    ;; WHEN: Sun Aug 11 20:07:59 2013
    ;; XFR size: 65 records (messages 65, bytes 4501)

    A. The hacker used whois to gather publicly available records for the domain.
    B. The hacker used the “fierce” tool to brute force the list of available domains.
    C. The hacker listed DNS records on his own domain.
    D. The hacker successfully transfered the zone and enumerated the hosts.

    1. Yeah, I too formatted the ques in notepad before tyring to understand it.
      I hope questions come formatted in the real test, otherwise its going to be hella confusing and time consuming.

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.