Windows Virtual PC is pretty slick for having virtual machines on a Windows 7 computer. I use it for multiple Linux virtual environments including Backtrack and CentOS on a regular basis. One issue you may run into is that your wireless network card will likely not work in Linux so you will be required to use shared networking (NAT) instead. Below is information on what you will need to do to get shared networking (NAT) operational in Backtrack Linux.
Recently a friend asked me to configure a GoDaddy hosting account for him. We started with purchasing the GoDaddy Hosting account and then I walked through the setup with him. One of the portions of the setup has you point the domain to the proper GoDaddy IP address or you can modify the NS to the proper GoDaddy name servers. So if you want to preview the site before the DNS has updated and you can reach it by domain you have to enable Preview DNS on GoDaddy which is described in more detail below.
The next tool I am going to look at is a really great ruby script written by my friend Carlos (Dark operator) Perez. Its called Dnsrecon and is included in Backtrack 4. This is a simple tool written for target enumeration during authorized penetration test engagements. This tool provides different methods for enumerating targets via DNS service.
Backtrack 4: Information Gathering: DNS: Dnsenum – Enumerate information on a domain and discover non-contiguous ip blocks
Dnsenum is a very robust script which was actually written by one of the Backtrack developers when Backtrack was still a Remote-Exploit Project. The author, Filip (barbsie) Waeytens is a Web Application penetration tester and has extensive experience on the topic of DNS and information gathering. Today we will look at some examples of using Dnsenum to passively gather information on a target.
This is going to be the second of my articles on the DNS section of Backtrack 4. While it isn’t as exciting as popping a box with the newest 0-day, passive information gathering in one of the most crucial steps of a successful pentest. Today we are going to look at Dnstracer.