Dnsenum

How to Use the dnsenum for DNS Enumeration and Subdomain Discovery

The dnsenum tool is a versatile utility used in penetration testing to perform DNS enumeration and uncover subdomains. This guide will walk you through various options and usage examples for conducting DNS enumeration on a target domain.

Usage Examples

1. Basic DNS Enumeration

dnsenum [options] <domain>
dnsenum zonetransfer.me

2. Using a Specific DNS Server

dnsenum domain.com --dnsserver ns1.domain.com

3. Brute Forcing with a Wordlist

dnsenum domain.com -f /usr/share/dnsenum/dns.txt

4. Advanced Enumeration

dnsenum --subfile elsfoosubs.txt -v -f /usr/share/dnsenum/dns.txt -u a -r elsfoo.com

5. Finding Subdomains

To find subdomains, you can use the following command which scrapes 100 subdomains from 20 Google search pages, utilizing 5 threads:

dnsenum -p 20 -s 100 --threads 5 domain.com

Last updated

Was this helpful?