GET {{dns_service}}/{{domain}}/dlv
Recently vulnerabilities in the DNS were discovered that allow an attacker to hijack this process of looking some one up or looking a site up on the Internet using their name. The purpose of the attack is to take control of the session to, for example, send the user to the hijacker's own deceptive web site for account and password collection. These vulnerabilities have increased interest in introducing a technology called DNS Security Extensions (DNSSEC) to secure this part of the Internet's infrastructure.
Body
PARAM
Key | Datatype | Required | Description |
HEADERS
Key | Datatype | Required | Description |
RESPONSES
status OK
{
"question": [
{
"name": "getpostman.com.",
"type": "DLV",
"class": "IN"
}
],
"answer": null,
"authority": [
{
"name": "getpostman.com.",
"type": "SOA",
"class": "IN",
"ttl": 899,
"rdlength": 69,
"rdata": "ns-833.awsdns-40.net. awsdns-hostmaster.amazon.com. 1 7200 900 1209600 86400"
}
]
} |
ENDPOINTS