This script (ab)uses DNS history records. This script will search for old DNS A records and check if the server replies for that domain. It also outputs a confidence level, based on the similarity in HTML response of the possible origin server and the firewall.

The script will try to find

  • the direct IP address of a server behind a firewall like Cloudflare, Incapsula, SUCURI …
  • an old server which still running the same (inactive and unmaintained) website, not receiving active traffic because the A DNS record is not pointing towards it. Because it’s an outdated and unmaintained website version of the currently active one, it is likely vulnerable for various exploits. It might be easier to find SQL injections and access the database of the old website and abuse this information to use on the current and active website.

Download bypass-firewalls-by-DNS-history

LEAVE A REPLY

Please enter your comment!
Please enter your name here