Last Updated on August 14, 2021 by Admin
Look at the following output. What did the hacker accomplish?
- The hacker used whois to gather publicly available records for the domain.
- The hacker used the “fierce” tool to brute force the list of available domains.
- The hacker listed DNS records on his own domain.
- The hacker successfully transfered the zone and enumerated the hosts.