A Win32 version of digL http://members.shaw.ca/nicholas.fong/dig/
On Mon, Feb 23, 2009 at 09:23, Jason Gurtz <jasongu...@npumail.com> wrote: > Note: the dig tool is easier and better than nslookup, but unfortunately > doesn't come with windows. You can download the Windows port of the BIND > name server and find dig there, but that's extra steps to find out just > what dlls you also need, etc... If you're going to do this a lot I do > recommend that you take the time to learn dig instead of nslookup. > >> In the reverse DNS section of this tool, do I need to check the box? I >> don't host my external DNS records, so I don't know what PTR records, if >> any, are out there. > > Open cmd prompt. Type nslookup and press enter. At the new "> " prompt > type set type=ptr and press enter > > wacky thing #1: IP addy that you query is backwards from what it is > wacky thing #2: you are querying for the backwards address in this weird > domain called in-addr.arpa. You can think of .in-addr.arpa as being to > IP addresses the same as .com. or .org. are to domain names. It is the > story of the whale; it's just how it is. > > So, for example let's look up some aol.com PTR records...3 MX records I > see are: > > mailin-01.mx.aol.com internet address = 205.188.156.248 > mailin-02.mx.aol.com internet address = 205.188.249.91 > mailin-03.mx.aol.com internet address = 205.188.252.17 > > Hey, let's see if their ducks are in a row! To query the PTR record for > the first one just type this: > >> 248.156.188.205.in-addr.arpa > > After pressing enter you should see something like this : > > Non-authoritative answer: > 248.156.188.205.in-addr.arpa name = dd.mx.aol.com > > What!? dd.mx.aol.com != mailin-01.mx.aol.com. Well that's OK, aol is > probably not sending any mail out from this box here ;) Likely, that > "box" is a load balancer of some type... OK, trawling through some logs > here I do see them sending mail from host imo-d05.mx.aol.com which has an > address of 205.188.157.37. Let's check it out! > >> set type=a >> imo-d05.mx.aol.com > Server: dns-01.ns.aol.com > Address: 64.12.51.132 > > Name: imo-d05.mx.aol.com > Address: 205.188.157.37 > > [Yup, still sitting on the same addy] > >> set type=ptr >> 37.157.188.205.in-addr.arpa > Server: dns-01.ns.aol.com > Address: 64.12.51.132 > > 37.157.188.205.in-addr.arpa name = imo-d05.mx.aol.com > > [This time we have a match! AOL admins know what they're doing.] > > 157.188.205.in-addr.arpa nameserver = dns-02.ns.aol.com > 157.188.205.in-addr.arpa nameserver = dns-01.ns.aol.com > dns-01.ns.aol.com internet address = 64.12.51.132 > dns-02.ns.aol.com internet address = 205.188.157.232 > > So yeppers, all aol.com ducks in a row for that outbound server. As you > can see nslookup also tells you what name servers have authority for the > address space containing 205.188.157.37. Using a whois tool you can > lookup who has registered ownership of the IP block. Now we're getting > off on a spam fighting tangent.... > > if you want to script nslookup to do auditing you can use the tool like > this to query one address at a time. Now you can loop over a whole block > of IPs that you might own in a batch file or powershell or whatever: > > C:\>nslookup -type=ptr 37.157.188.205.in-addr.arpa dns-01.ns.aol.com > > The last argument (dns server to query) is optional. By default, nslookup > should be querying the first dns server listed in your ipconfig /all > output. If you're at the nslookup prompt the command "server > <serverName|IP> will do the same thing. Check the ? command to see other > commands. Note: -type=a would be redundant since it's the default query > type assumed and obviously -type=mx could be useful in the email world as > well. > > ~JasonG > > -- > > ~ Ninja Email Security with Cloudmark Spam Engine Gets Image Spam ~ > ~ http://www.sunbeltsoftware.com/Ninja ~ > ~ Ninja Email Security with Cloudmark Spam Engine Gets Image Spam ~ ~ http://www.sunbeltsoftware.com/Ninja ~