DNS测试工具
2018-03-30 11:24
316 查看
一、dig命令
dig - 用于测试dns系统, 因此, 不会查询hosts文件进行解析.# 用法: dig [@dns_server] [-t rr_type] name [query option]
正向解析测试:
# 用法: dig -t A FQDN [@dns_server] # 示例: [root@leistudy named]# dig -t A www.leistudy.com @192.168.123.100 ; <<>> DiG 9.9.4-RedHat-9.9.4-51.el7_4.2 <<>> -t A www.leistudy.com @192.168.123.100 ;; global options: +cmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 29655 ;; flags: qr aa rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 2, ADDITIONAL: 3 ;; OPT PSEUDOSECTION: ; EDNS: version: 0, flags:; udp: 4096 ;; QUESTION SECTION: ;www.leistudy.com. IN A ;; ANSWER SECTION: www.leistudy.com. 86400 IN A 192.168.123.100 ;; AUTHORITY SECTION: leistudy.com. 86400 IN NS ns2.leistudy.com. leistudy.com. 86400 IN NS ns1.leistudy.com. ;; ADDITIONAL SECTION: ns1.leistudy.com. 86400 IN A 192.168.123.100 ns2.leistudy.com. 86400 IN A 192.168.123.101 ;; Query time: 0 msec ;; SERVER: 192.168.123.100#53(192.168.123.100) ;; WHEN: Thu Mar 29 17:11:04 CST 2018 ;; MSG SIZE rcvd: 129
query option:
# query option # +[no]trace: 跟踪解析过程 # +[no]recurse: 进行递归解析 # 示例: [root@leistudy named]# dig -t A www.baidu.com +trace ; <<>> DiG 9.9.4-RedHat-9.9.4-51.el7_4.2 <<>> -t A www.baidu.com +trace ;; global options: +cmd . 5 IN NS l.root-servers.net. . 5 IN NS i.root-servers.net. . 5 IN NS e.root-servers.net. . 5 IN NS j.root-servers.net. . 5 IN NS b.root-servers.net. . 5 IN NS c.root-servers.net. . 5 IN NS a.root-servers.net. . 5 IN NS f.root-servers.net. . 5 IN NS d.root-servers.net. . 5 IN NS k.root-servers.net. . 5 IN NS h.root-servers.net. . 5 IN NS g.root-servers.net. . 5 IN NS m.root-servers.net. ;; Received 239 bytes from 192.168.123.2#53(192.168.123.2) in 836 ms com. 172800 IN NS a.gtld-servers.net. com. 172800 IN NS b.gtld-servers.net. ... # 内容太多, 省略 a.shifen.com. 1200 IN NS ns1.a.shifen.com. a.shifen.com. 1200 IN NS ns4.a.shifen.com. ;; Received 239 bytes from 202.108.22.220#53(dns.baidu.com) in 59 ms
反向解析测试:
# 用法: dig -x IP [@dns_server]或者dig -t PTR IP [@dns_server] # 示例: [root@leistudy named]# dig -x 61.135.169.121 @119.29.29.29 ; <<>> DiG 9.9.4-RedHat-9.9.4-51.el7_4.2 <<>> -x 61.135.169.121 @119.29.29.29 ;; global options: +cmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44185 ;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1 ;; OPT PSEUDOSECTION: ; EDNS: version: 0, flags:; udp: 4096 ;; QUESTION SECTION: ;121.169.135.61.in-addr.arpa. IN PTR ;; AUTHORITY SECTION: 169.135.61.in-addr.arpa. 6135 IN SOA dns.baidu.com. sa.baidu.com. 2012091801 300 600 2592000 7200 ;; Query time: 560 msec ;; SERVER: 119.29.29.29#53(119.29.29.29) ;; WHEN: Thu Mar 29 17:25:44 CST 2018 ;; MSG SIZE rcvd: 108
模拟区域传送:
# 用法: dig -t axfr ZONE_NAME @dns_server # 示例: 正向区域传送 [root@docker-package ~]# dig -t axfr leistudy.com @192.168.123.132 ; <<>> DiG 9.9.4-RedHat-9.9.4-51.el7_4.2 <<>> -t axfr leistudy.com @192.168.123.132 ;; global options: +cmd leistudy.com. 86400 IN SOA ns1.leistudy.com. admin.leistudy.com.leistudy.com. 2018030101 3600 300 604800 86400 leistudy.com. 86400 IN NS ns1.leistudy.com. leistudy.com. 86400 IN NS ns2.leistudy.com. leistudy.com. 86400 IN MX 10 mx1.leistudy.com. leistudy.com. 86400 IN MX 20 mx2.leistudy.com. ftp.leistudy.com. 86400 IN CNAME www.leistudy.com. mx1.leistudy.com. 86400 IN A 192.168.123.132 mx2.leistudy.com. 86400 IN A 192.168.123.101 ns1.leistudy.com. 86400 IN A 192.168.123.132 ns2.leistudy.com. 86400 IN A 192.168.123.101 www.leistudy.com. 86400 IN A 192.168.123.132 leistudy.com. 86400 IN SOA ns1.leistudy.com. admin.leistudy.com.leistudy.com. 2018030101 3600 300 604800 86400 ;; Query time: 3 msec ;; SERVER: 192.168.123.132#53(192.168.123.132) ;; WHEN: Sat Mar 03 10:12:28 CST 2018 ;; XFR size: 12 records (messages 1, bytes 299) # 示例: 反向区域传送 [root@docker-package ~]# dig -t axfr 123.168.192.in-addr.arpa @192.168.123.132 ; <<>> DiG 9.9.4-RedHat-9.9.4-51.el7_4.2 <<>> -t axfr 123.168.192.in-addr.arpa @192.168.123.132 ;; global options: +cmd 123.168.192.in-addr.arpa. 86400 IN SOA ns1.leistudy.com. admin.leistudy.com. 2018030101 3600 300 604800 86400 123.168.192.in-addr.arpa. 86400 IN NS ns1.leistudy.com. 123.168.192.in-addr.arpa. 86400 IN NS ns2.leistudy.com. 101.123.168.192.in-addr.arpa. 86400 IN PTR mx2.leistudy.com. 132.123.168.192.in-addr.arpa. 86400 IN PTR ns1.leistudy.com. 132.123.168.192.in-addr.arpa. 86400 IN PTR mx1.leistudy.com. 132.123.168.192.in-addr.arpa. 86400 IN PTR www.leistudy.com. 123.168.192.in-addr.arpa. 86400 IN SOA ns1.leistudy.com. admin.leistudy.com. 2018030101 3600 300 604800 86400 ;; Query time: 1 msec ;; SERVER: 192.168.123.132#53(192.168.123.132) ;; WHEN: Sat Mar 03 10:12:50 CST 2018 ;; XFR size: 8 records (messages 1, bytes 244)
二、host命令
host - DNS查询工具.# 用法: host [-t rr_type] name [dns_server] # 示例1: 正向解析查询 [root@leistudy named]# host -t A www.leistudy.com 192.168.123.100 Using domain server: Name: 192.168.123.100 Address: 192.168.123.100#53 Aliases: www.leistudy.com has address 192.168.123.100 # 示例2: NS记录查询 [root@leistudy named]# host -t NS leistudy.com 192.168.123.100 Using domain server: Name: 192.168.123.100 Address: 192.168.123.100#53 Aliases: leistudy.com name server ns1.leistudy.com. leistudy.com name server ns2.leistudy.com.
三、nslookup命令
nslookup - 查询域名的dns信息, 可通过交互式方式进行.# 用法: nslookup [option] [name|-] [server] # 交互模式: ~]# nslookup nslookup> # server IP: 指明使用哪个DNS服务器进行查询 # set q=RR_TYPE: 指明查询的资源记录类型 # NAME: 要查询的名称 [root@leistudy named]# nslookup > server 192.168.123.100 # 设置要查询的dns服务器 Default server: 192.168.123.100 Address: 192.168.123.100#53 > www.leistudy.com # 默认直接返回A记录对应的地址 Server: 192.168.123.100 Address: 192.168.123.100#53 Name: www.leistudy.com Address: 192.168.123.100 > set q=NS # 指明查询NS记录 > leistudy.com Server: 192.168.123.100 Address: 192.168.123.100#53 leistudy.com nameserver = ns1.leistudy.com. leistudy.com nameserver = ns2.leistudy.com. > set q=A # 指明查询A记录 > web.leistudy.com Server: 192.168.123.100 Address: 192.168.123.100#53 web.leistudy.com canonical name = www.leistudy.com. Name: www.leistudy.com Address: 192.168.123.100
相关文章推荐
- [AD]使用DCDiag工具测试域控制器的网络连接和DNS解析
- DNS压力测试工具:queryperf
- 利用ping/ipconfig/nslookup/dig/whois简单工具测试DNS
- [AD]使用NetDiag工具测试工作站和服务器的网络连接和DNS解析
- 利用ping/ipconfig/nslookup/dig/whois简单工具测试DNS
- dns服务器测试工具:queryperf
- DNS压力测试工具dnsperf简介
- DNS压力测试工具dnsperf简介
- dnscat使用——整体感觉这个工具不完善,失败率很高,传文件时候没有完整性校验,我自己测试时通过域名转发失败,可能是其特征过于明显导致
- 利用ping/ipconfig/nslookup/dig/whois简单工具测试DNS
- DNS压力测试工具dnsperf简介
- DNS基准测试工具(优化你的网络解析)
- 利用ping/ipconfig/nslookup/dig/whois简单工具测试DNS 推荐
- DNS客户端测试工具详解
- DnsTester(DNS 服务器性能测试工具)
- 利用ping/ipconfig/nslookup/dig/whois简单工具测试DNS
- 深入浅出DNS系列(十一)- 压力测试工具与根服务器提示文件
- 如何写一个DNS压力测试工具
- DNS延迟测试工具下载地址
- Web性能压力测试工具之ApacheBench(ab)详解