Forrest logo
back to the dnsrecon tool

dnsrecon:tldr:130ad

dnsrecon: Scan a domain, using a brute-force attack and a dictionary of subdomains and hostnames.
$ dnsrecon --domain ${example-com} --dictionary ${path-to-dictionary-txt} --type brt
try on your machine

The command "dnsrecon" is a tool used for DNS reconnaissance, which means gathering information about the DNS (Domain Name System) infrastructure of a target domain.

In this specific command:

  • "--domain ${example-com}" specifies the target domain for which you want to perform DNS reconnaissance. Replace "${example-com}" with the actual domain name (e.g., "example.com").
  • "--dictionary ${path-to-dictionary-txt}" refers to a dictionary file containing a list of subdomains or hostnames that will be used to conduct a dictionary-based subdomain brute force. Replace "${path-to-dictionary-txt}" with the actual path to the dictionary file in your system.
  • "--type brt" specifies the scan type as "brt" which stands for "brute force". This means the tool will attempt to find additional subdomains or hostnames by systematically trying different combinations or variations using the dictionary file provided.

By running this command, dnsrecon will attempt to perform a brute force subdomain enumeration using the dictionary file to find any additional subdomains associated with the target domain.

This explanation was created by an AI. In most cases those are correct. But please always be careful and never run a command you are not sure if it is safe.
back to the dnsrecon tool