Dnsenum
How to Use the dnsenum
for DNS Enumeration and Subdomain Discovery
dnsenum
for DNS Enumeration and Subdomain DiscoveryThe dnsenum
tool is a versatile utility used in penetration testing to perform DNS enumeration and uncover subdomains. This guide will walk you through various options and usage examples for conducting DNS enumeration on a target domain.
Usage Examples
1. Basic DNS Enumeration
dnsenum [options] <domain>
dnsenum zonetransfer.me
2. Using a Specific DNS Server
dnsenum domain.com --dnsserver ns1.domain.com
3. Brute Forcing with a Wordlist
dnsenum domain.com -f /usr/share/dnsenum/dns.txt
4. Advanced Enumeration
dnsenum --subfile elsfoosubs.txt -v -f /usr/share/dnsenum/dns.txt -u a -r elsfoo.com
5. Finding Subdomains
To find subdomains, you can use the following command which scrapes 100 subdomains from 20 Google search pages, utilizing 5 threads:
dnsenum -p 20 -s 100 --threads 5 domain.com
Last updated
Was this helpful?