ðPort 53 (DNS)
Domain name system (DNS)
whois
whois <domain>
whois <ip>
Dig
dig axfr @dns-server domain.name
dig -x 10.10.10.10 @10.10.10.10
nslookup
nslookup <domain>
nslookup
set type=mx
set type=ns
dnsenum <DOMAIN>
Zone transfer
root@kali:# host -t ns uocra.org
root@kali:# host -l uocra.org <dns to get the transfer>
dnsrecon
root@kali:# dnsrecon -d megacorpone.com -t axfr
the harvester
scrapea mails y mucha data
:~#theharvester -d cisco.com -l 500 -b all
Recon-ng
webreconnaissance framework written in python
$ recon-ng <to start
$ help < to see help
$ show modules
$ load modules
$ use [module]
$ show info
$ set source
$ run
nmap
dns hostname lookup
nmap -F --dns-server <dns server ip> <target ip range>`
Host Lookup
host -t ns megacorpone.com
`Reverse Lookup Brute Force - find domains in the same range
for ip in $(seq 155 190);do host 50.7.67.$ip;done |grep -v "not found"
Perform DNS IP Lookup
dig a domain-name-here.com @nameserver
Reverse lookup
dig -x 10.10.10.13 @nameserver
Perform MX Record Lookup
dig mx domain-name-here.com @nameserver
Perform Zone Transfer with DIG
dig axfr domain-name-here.com @nameserver
Windows DNS zone transfer
nslookup -> set type=any -> ls -d blah.com
Linux DNS zone transfer
dig axfr blah.com @ns1.blah.com
Dnsrecon DNS Brute Force subdomain
dnsrecon -d TARGET -D /usr/share/wordlists/dnsmap.txt -t std --xml ouput.xml
Dnsrecon DNS List of megacorp
dnsrecon -d megacorpone.com -t axfr
DNSEnum
dnsenum zonetransfer.me
DNS brute force
https://github.com/blark/aiodnsbrute
Last updated