Forrest logo
back to the dnsrecon tool

dnsrecon:tldr:ba008

dnsrecon: Scan a domain, performing a reverse lookup of IP ranges from the SPF record and saving the results to a JSON file.
$ dnsrecon --domain ${example-com} -s --json
try on your machine

The dnsrecon command is a command-line tool used for DNS reconnaissance. It is primarily used to gather information about DNS records of a given domain.

Let's break down the provided command:

  • dnsrecon: This is the main command that invokes the dnsrecon tool.
  • --domain ${example-com}: Here, you need to replace ${example-com} with the domain name you want to perform reconnaissance on. For example, if you want to scan the domain example.com, you would replace ${example-com} with example.com. This flag specifies the target domain for the DNS reconnaissance.
  • -s: The -s flag stands for "stealth mode." When enabled, the tool will disable reverse DNS lookups and attempt to stay stealthy, minimizing the chances of alerting any potential intrusion detection systems.
  • --json: This flag tells the tool to output the results in JSON format. Instead of displaying the output in the terminal, it will generate structured data in JSON, which can be easily processed and analyzed by other tools or scripts.

Overall, the given dnsrecon command scans the DNS records of a specified domain, enables stealth mode, and outputs the results in JSON format.

This explanation was created by an AI. In most cases those are correct. But please always be careful and never run a command you are not sure if it is safe.
back to the dnsrecon tool