Dnsrecon
How to Use the dnsrecon
Tool for DNS Enumeration
dnsrecon
Tool for DNS EnumerationThe dnsrecon
tool is a powerful utility used in the information gathering phase of penetration testing to perform DNS reconnaissance. Below is a guide on how to utilize dnsrecon
with different options to conduct DNS enumeration on a target domain:
1. Basic DNS Enumeration
Explanation: This command initiates a basic DNS enumeration on the domain megacorpone.com
. It gathers various DNS records such as A, AAAA, MX, and NS, providing a comprehensive overview of the domain's DNS configuration.
2. Querying Zone Transfer
Explanation: This command tries to perform a DNS zone transfer on the domain zonetransfer.me
. A zone transfer allows for the replication of DNS databases across a group of DNS servers. Using the -t axfr
option specifies that a zone transfer query is to be conducted. It is important to note that zone transfers should ideally be restricted to authorized DNS servers to prevent the exposure of sensitive information.
3. Subdomain Bruteforcing
Explanation: This command conducts subdomain bruteforcing on the domain zonetransfer.me
utilizing a specified wordlist found at /opt/secLists/Discovery/DNS/subdomains-top1million-110000.txt
. The -t brt
option indicates that a bruteforce attack is to be conducted to discover potential subdomains. This method can unveil hidden or non-public subdomains that might host various services or applications.
Last updated
Was this helpful?