DNS Enumeration

Examine domain name system (DNS) using dnsenum, nslookup, dig and fierce tool

Check for zone transfer

Bruteforce subdomain using fierce tool

Run all nmap scripts using following command: nmap -Pn -sU -p53 --script dns* -v

Banner grabbing and finding publicly known exploits

Check for DNS amplification attack

NMAP DNS Hostnames Lookup

nmap -F --dns-server <dns server ip><target ip range>

Host Lookup

host -t ns megacorpone.com

Reverse Lookup Brute Force - find domains in the same range

for ip in $(seq 155 190);do host 50.7.67.$ip;done |grep -v "not found"

Perform DNS IP Lookup

dig a domain-name-here.com @nameserver

Perform MX Record Lookup

dig mx domain-name-here.com @nameserver

Perform Zone Transfer with DIG

dig axfr domain-name-here.com @nameserver

DNS Zone Transfers

Windows DNS zone transfer

nslookup -> set type=any -> ls -d blah.com

Linux DNS zone transfer

dig axfr blah.com @ns1.blah.com

Dnsrecon DNS Brute Force

dnsrecon -d TARGET -D /usr/share/wordlists/dnsmap.txt -t std --xml ouput.xml

Dnsrecon DNS List of megacorp

dnsrecon -d megacorpone.com -t axfr

DNSEnum

dnsenum zonetransfer.me

results matching ""

    No results matching ""