Forrest logo
tool overview
On this page you find all important commands for the CLI tool dnsrecon. If the command you are looking for is missing please ask our AI.

dnsrecon

dnsrecon is a powerful command line tool used for performing DNS reconnaissance and enumeration. It helps in discovering and gathering information about DNS servers, domains, subdomains, hosts, and other related details.

  1. DNS reconnaissance is essential in penetration testing and information gathering for ethical hackers and security professionals.
  2. dnsrecon is written in Python and provides various options to perform DNS enumeration tasks.
  3. The tool allows scanning multiple targets simultaneously to quickly gather information.
  4. It supports multiple DNS record types like A, AAAA, CNAME, MX, NS, SOA, TXT, and more.
  5. dnsrecon can perform zone transfers to enumerate subdomains and discover DNS server misconfigurations.
  6. It has options to perform wordlist brute forcing to find subdomains or hostnames associated with a specific domain.
  7. The tool can perform reverse DNS lookups to identify the PTR record associated with an IP address.
  8. It includes an option to brute force or guess the hostnames or IPs of machines on a local network segment.
  9. DNS cache snooping and analysis can be performed to reveal cached information about a target's DNS records.
  10. dnsrecon allows output in various formats, making it easy to integrate with other tools or scripts for further analysis.

List of commands for dnsrecon:

  • dnsrecon:tldr:130ad dnsrecon: Scan a domain, using a brute-force attack and a dictionary of subdomains and hostnames.
    $ dnsrecon --domain ${example-com} --dictionary ${path-to-dictionary-txt} --type brt
    try on your machine
    explain this command
  • dnsrecon:tldr:145b0 dnsrecon: Scan a domain, performing DNS cache snooping.
    $ dnsrecon --domain ${example-com} --type snoop --name_server ${nameserver-example-com} --dictionary ${path-to-dictionary-txt}
    try on your machine
    explain this command
  • dnsrecon:tldr:6f32b dnsrecon: Scan a domain, specifying the nameserver and performing a zone transfer.
    $ dnsrecon --domain ${example-com} --name_server ${nameserver-example-com} --type axfr
    try on your machine
    explain this command
  • dnsrecon:tldr:84655 dnsrecon: Scan a domain, performing zone walking.
    $ dnsrecon --domain ${example-com} --type zonewalk
    try on your machine
    explain this command
  • dnsrecon:tldr:ba008 dnsrecon: Scan a domain, performing a reverse lookup of IP ranges from the SPF record and saving the results to a JSON file.
    $ dnsrecon --domain ${example-com} -s --json
    try on your machine
    explain this command
  • dnsrecon:tldr:da6c3 dnsrecon: Scan a domain and save the results to a SQLite database.
    $ dnsrecon --domain ${example-com} --db ${path-to-database-sqlite}
    try on your machine
    explain this command
  • dnsrecon:tldr:da9da dnsrecon: Scan a domain, performing a Google enumeration and saving the results to a CSV file.
    $ dnsrecon --domain ${example-com} -g --csv
    try on your machine
    explain this command
tool overview