πŸ‘¨β€πŸ’»
Jawad's Notes
  • πŸ‘¨β€πŸ«INFOSEC
    • πŸ•ΈοΈWeb
      • Burp Suite: Setting Foxyproxy
      • XSS
      • Wappalyzer
      • Directory Traversal
      • LFI
        • PHP Wrappers
        • RFI
      • Reverse Shell
        • Command Injection Quick Tips
      • File Upload
      • WPScan
      • SQL Injection
        • Schemas
        • SQLmap
        • MSSQL
        • MySQL
        • PostgreSQL
    • πŸ”§Tools
      • Whois
      • DNSRecon
      • DNSenum
      • nslookup
      • Netcat
        • Powercat
      • Nmap
        • Nmap Scripting Engine
        • Test-NetConnection
        • Grep
      • Server Message Block (SMB)
      • SNMP
      • SMTP
      • ExifTool
      • Search Engine Hacking
      • Source Control Hacking
      • Nessus
      • Canarytokens
      • Qualys SSL Server Test
      • Security Headers
      • theHarvester
      • Shodan
      • Gobuster
        • Dirb
      • Searchsploit
      • Password Cracking
        • Hashcat
        • John The Ripper
        • Hydra
        • hashID
        • CPU vs GPU
    • 🐧Linux
      • Symbols
      • cat
      • curl
      • openvpn
      • tcpdump
      • Remote Desktop
      • SmbShare
      • Tmux
      • Convert Windows-style line endings (CRLF) to Unix-style (LF)
      • SSH
    • πŸ–₯️Macros in Office
    • 🍎Enhancing Your MacOS Terminal Experience
    • 🚩CTF
      • SQL Injection
        • WHERE clause allowing retrieval of hidden data
        • Allowing login bypass
        • UNION attack, determining the number of columns returned by the query
        • UNION attack, finding a column containing text
        • UNION attack, retrieving data from other tables
        • UNION attack, retrieving multiple values in a single column
        • Querying the database type and version on Oracle
Powered by GitBook
On this page
  1. INFOSEC
  2. Tools

DNSRecon

DNSRecon is a versatile open-source tool designed for DNS enumeration and information gathering.

Purpose: DNSRecon assists in discovering and extracting valuable information related to DNS records, subdomains, and zone transfers.

Key Features:

  • Subdomain Enumeration

  • Zone Transfer Analysis

  • Brute-Force Dictionary Attacks

  • DNSSEC (DNS Security Extensions) Support

  • WHOIS Information Retrieval

Examples:

  1. General Enumeration:

    kali@kali:~$ dnsrecon -d jawad.ca -t std     
    [*] std: Performing General Enumeration against: jawad.ca...
    [-] DNSSEC is not configured for jawad.ca
    [*]      SOA dns1.registrar-servers.com 156.154.132.200
    [*]      SOA dns1.registrar-servers.com 2610:a1:1024::200
    [*]      NS dns1.registrar-servers.com 156.154.132.200
    [*]      Bind Version for 156.154.132.200 Nameserver"
    [*]      NS dns1.registrar-servers.com 2610:a1:1024::200
    [*]      NS dns2.registrar-servers.com 156.154.133.200
    [*]      Bind Version for 156.154.133.200 Nameserver"
    [*]      NS dns2.registrar-servers.com 2610:a1:1025::200
    [*]      MX mx1.privateemail.com 198.54.122.240
    [*]      MX mx2.privateemail.com 198.54.122.250
    [*]      A jawad.ca 185.199.110.153
    [*]      A jawad.ca 185.199.111.153
    [*]      A jawad.ca 185.199.109.153
    [*]      A jawad.ca 185.199.108.153
    [*]      TXT jawad.ca v=spf1 include:spf.privateemail.com ~all
    [*] Enumerating SRV Records
    [+]      SRV _autodiscover._tcp.jawad.ca privateemail.com 198.54.122.136 443
    [+] 1 Records Found
    

  2. Zone Transfer Analysis:

    kali@kali:~$ dnsrecon -d jawad.ca -t zonewalk
    [*] Performing NSEC Zone Walk for jawad.ca
    [*] Getting SOA record for jawad.ca
    [*] Name Server 156.154.132.200 will be used
    [*]      A jawad.ca 185.199.110.153
    [*]      A jawad.ca 185.199.108.153
    [*]      A jawad.ca 185.199.111.153
    [*]      A jawad.ca 185.199.109.153
    [+] 4 records found
    

    Conducts a comprehensive zone transfer analysis to identify authoritative name servers.

  3. Brute-Force Dictionary Attack:

    dnsrecon -d example.com -D /path/to/wordlist.txt

    Executes a dictionary attack on the domain "example.com" using a specified wordlist, uncovering potential subdomains.

  4. DNSSEC Support:

    dnsrecon -d example.com -a

    Retrieves DNSSEC information for the domain "example.com," highlighting the presence of DNS security extensions.

  5. WHOIS Information Retrieval:

    dnsrecon -d example.com -w

    Fetches WHOIS information for the domain "example.com," providing insights into domain registration details.

Resources:

PreviousWhoisNextDNSenum

Last updated 1 year ago

πŸ‘¨β€πŸ«
πŸ”§
https://www.kali.org/tools/dnsrecon/