DNS
Domain Name System - Port 53
DNS Transaction Analysis
The
DNSmessage starts after the lower-layer headers (Ethernet+IP+UDP= usually42 byteson standardIPv4.The first two bytes of the
DNSpayload are theTXID(in big-endian order).The
TXIDvalue itself changes with nearly every new query and is randomized for security.The
TXIDis always the same in a matching query/response pair, making it easy to spot related packets.DNSserver doesn't know the completeURL, just the host; the part after the slash is handle byHTTP.
0000 00 00 00 00 00 00 00 00 00 00 00 00 08 00 45 00 ........ ......E.
0010 00 3c 51 e3 40 00 40 11 ea cb 7f 00 00 01 7f 00 .<Q.@.@. ........
0020 00 01 ec ed 00 35 00 28 fe 3b 24 1a 01 00 00 01 .....5.( .;$.....
0030 00 00 00 00 00 00 03 77 77 77 06 67 6f 6f 67 6c .......w ww.googl
0040 65 03 63 6f 6d 00 00 01 00 01 e.com... .. To filter all packets with a specific
TXIDinWireshark: Right-click the Transaction ID field → Apply as Filter → Selected → or usedns.id == 0xXXXX
Resolve the IP with nslookup
nslookupSpecify the
DNSserver:
server 10.10.10.10Now, query for the given IP address, looking up its
DNSrecords:
10.10.10.10Passive DNS (PDNS)
Bypassing Cloudflare
Services that keep historical records of DNS resolutions might have the IP address from before the site was put behind Cloudflare, or from a misconfiguration:
https://securitytrails.comhttps://www.virustotal.comLast updated