πPort 53 (DNS)
Domain name system (DNS)
whois
whois <domain>
whois <ip>Dig
dig axfr @dns-server domain.name
dig -x 10.10.10.10 @10.10.10.10nslookup
nslookup <domain>
nslookup
set type=mx
set type=nsdnsenum <DOMAIN>Zone transfer
root@kali:# host -t ns uocra.org
root@kali:# host -l uocra.org <dns to get the transfer>dnsrecon
root@kali:# dnsrecon -d megacorpone.com -t axfrthe harvester
scrapea mails y mucha data
:~#theharvester -d cisco.com -l 500 -b allRecon-ng
webreconnaissance framework written in python
$ recon-ng <to start
$ help < to see help
$ show modules
$ load modules
$ use [module]
$ show info
$ set source
$ runnmap
dns hostname lookup
nmap -F --dns-server <dns server ip> <target ip range>`Host Lookup
host -t ns megacorpone.com`Reverse Lookup Brute Force - find domains in the same range
for ip in $(seq 155 190);do host 50.7.67.$ip;done |grep -v "not found"Perform DNS IP Lookup
dig a domain-name-here.com @nameserverReverse lookup
dig -x 10.10.10.13 @nameserverPerform MX Record Lookup
dig mx domain-name-here.com @nameserverPerform Zone Transfer with DIG
dig axfr domain-name-here.com @nameserverWindows DNS zone transfer
nslookup -> set type=any -> ls -d blah.comLinux DNS zone transfer
dig axfr blah.com @ns1.blah.comDnsrecon DNS Brute Force subdomain
dnsrecon -d TARGET -D /usr/share/wordlists/dnsmap.txt -t std --xml ouput.xmlDnsrecon DNS List of megacorp
dnsrecon -d megacorpone.com -t axfrDNSEnum
dnsenum zonetransfer.me
DNS brute force
https://github.com/blark/aiodnsbruteLast updated