Forrest logo
tool overview
On this page you find all important commands for the CLI tool dnsmap. If the command you are looking for is missing please ask our AI.

dnsmap

Dnsmap is a command line tool used for passive DNS mapping. It aims to gather DNS information about a particular domain or a group of domains. This tool can be used by penetration testers and security researchers to gather intelligence about potential targets. Dnsmap works by querying DNS servers for various types of DNS records, including A, AAAA, MX, NS, and CNAME records. The tool supports multiple DNS server types, such as BIND, Windows DNS server, and PowerDNS. Dnsmap uses multithreading to perform parallel DNS queries, making it efficient for large-scale domain mapping. The gathered DNS information can help in identifying subdomains, mail servers, and other network infrastructure related to a domain. It provides options for exporting the results to various formats, including plain text, CSV, XML, and JSON. Dnsmap also includes features like DNS wildcard support, DNSSEC support, and DNS cache snooping. Overall, this command line tool is a valuable asset for reconnaissance and information gathering when assessing network security.

List of commands for dnsmap:

  • dnsmap:tldr:9627d dnsmap: Store results to a CSV file.
    $ dnsmap ${example-com} -c ${filename-csv}
    try on your machine
    explain this command
  • dnsmap:tldr:d25ca dnsmap: Scan for subdomains using the internal wordlist.
    $ dnsmap ${example-com}
    try on your machine
    explain this command
  • dnsmap:tldr:dc32a dnsmap: Specify a list of subdomains to check for.
    $ dnsmap ${example-com} -w ${path-to-wordlist-txt}
    try on your machine
    explain this command
  • dnsmap:tldr:f13bc dnsmap: Ignore 2 IPs that are false positives (up to 5 possible).
    $ dnsmap ${example-com} -i ${123-45-67-89,98-76-54-32}
    try on your machine
    explain this command
tool overview