8 mar 2010

Saber que servidor de correos esta utilizando determinado dominio

Simplemente tecleamos en la consola:
dig dominio.com MX

Un ejemplo con google.com:
root@bt:~# dig google.com MX

; <<>> DiG 9.5.0-P2.1 <<>> google.com MX
;; global options:  printcmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 2354
;; flags: qr rd ra; QUERY: 1, ANSWER: 4, AUTHORITY: 0, ADDITIONAL: 4

;; QUESTION SECTION:
;google.com.                    IN      MX

;; ANSWER SECTION:
google.com.             5       IN      MX      400 google.com.s9b2.psmtp.com.
google.com.             5       IN      MX      100 google.com.s9a1.psmtp.com.
google.com.             5       IN      MX      300 google.com.s9b1.psmtp.com.
google.com.             5       IN      MX      200 google.com.s9a2.psmtp.com.

;; ADDITIONAL SECTION:
google.com.s9a1.psmtp.com. 5    IN      A       74.125.148.10
google.com.s9b1.psmtp.com. 5    IN      A       74.125.148.13
google.com.s9a2.psmtp.com. 5    IN      A       74.125.148.11
google.com.s9b2.psmtp.com. 5    IN      A       74.125.148.14

;; Query time: 23 msec
;; SERVER: 192.168.193.2#53(192.168.193.2)
;; WHEN: Sun Mar  7 23:05:16 2010
;; MSG SIZE  rcvd: 226

Entonces en la sección ANSWER SECTION en la 6° Columna después de MX aparecen los servidores SMTP de google...
google.com.s9b2.psmtp.com
google.com.s9a1.psmtp.com
google.com.s9b1.psmtp.com
google.com.s9a2.psmtp.com


P.D: Recordemos que dig también está para windows... googleen...

Salu2.

[+] ZioneR

Author & Editor

Ingeniero, me gusta la cyberseguridad, la programación y el blockchain.

1 Notaciones:

Labels

0-day (12) 1337day (1) 8.8 (2) Adobe Acrobat (1) Android (2) Anonimato (1) Anonymous (9) BackDoor (2) BackTrack (15) badUSB (1) Base64 (1) Black Hat (7) BlackHat (1) Blackploit (30) Brute Force (3) Bug (106) Bypass Password (1) Bypass Redirect (1) C99 Shell (1) Carding (1) CheatSheet (15) Chilean Way (2) Conference (10) Cryptsetup (1) CSRF (1) DDoS (11) DEF CON (3) DEFCON (7) Dev (1) Diapositivas (1) Diseño Web (1) Distro Linux (27) Documental (2) DoS (2) Drupal (1) DuckDuckGo (1) E-zine (18) Ekoparty (1) Escaneo (4) España (1) Exploit (64) Ezine (1) Facebook (1) Fast-Info (44) FBI (1) Ficheros Binarios (1) Firefox (4) Flash (2) Forense (9) Fuerza Bruta (11) Fuga de Datos (1) GhostShell (1) GNU/Linux (4) Google (2) Guía (1) Hack T00LZ (135) Hack Tips (63) Hacked (6) Hacking (19) Hacking Hardware (5) HashCat (1) Herramientas (125) HighSecCON (1) Humor Geek (13) Infografía (1) Ingeniería Social (5) Inj3ct0r (1) Internet Explorer (3) Java (7) JavaScript (2) Kali (3) KitPloit (6) Leaks (22) Linux OS (79) LulzSec (1) Mac OS (10) Magazine (1) Malaware (3) Malaware Tools (12) Malware (1) Man in the Middle (15) Manuales (3) MD5 CRACK (4) Metasploit (57) MSSQL (1) MySQL (6) MySQL CRACK (1) Nmap (6) Nmap NSE (2) Noticias (200) NTLM CRACK (1) Ofuscar (5) OpenSolaris OS (1) OpenSSL (1) ORACLE (1) OWASP (3) Paper (10) PDF (7) PenTest (14) Perl (2) Phearking (13) Phishing (3) PHP (13) phpMyAdmin (1) PoC (1) Premios Bitacoras (1) Presentaciones (11) PRISM (1) Privacidad (2) Programación (12) Programas Linux (41) Programas Windows (41) Pwned (1) Python (5) Ransomware (1) Reconocimiento (5) Ruby (2) s (1) Scripts (7) Seguridad (150) Seguridad Web (139) Seguridad Wireless (19) Sensitive Data Exposure (2) SHA1 CRACK (1) Shellshock (1) Slides (1) Spoofing (1) Spyware (1) SQLi (19) SQLi Tools (7) SQLMap (2) SSH (1) Textos (74) Tips (57) Troyanos y Virus (11) Trucos (7) Trucos Win (7) Turiales (56) Tutoriales (18) Twitter (1) Ubuntu (2) Underc0de (1) UnderDOCS (1) Unlock (1) URL Redirection (1) UXSS (1) vBulletin (1) Video (48) Virtualización (2) Web T00LZ (16) Wifislax (1) Wikileaks (1) WikiRebels (1) Windows OS (65) Wireless Tools (13) XSS (16) Youtube (1)

 
biz.