On this page you find all important commands for the CLI tool dnsrecon. If the
command you are looking for is missing please ask our AI.
dnsrecon
dnsrecon
is a powerful command line tool used for performing DNS reconnaissance and enumeration. It helps in discovering and gathering information about DNS servers, domains, subdomains, hosts, and other related details.
- DNS reconnaissance is essential in penetration testing and information gathering for ethical hackers and security professionals.
dnsrecon
is written in Python and provides various options to perform DNS enumeration tasks.- The tool allows scanning multiple targets simultaneously to quickly gather information.
- It supports multiple DNS record types like A, AAAA, CNAME, MX, NS, SOA, TXT, and more.
dnsrecon
can perform zone transfers to enumerate subdomains and discover DNS server misconfigurations.- It has options to perform wordlist brute forcing to find subdomains or hostnames associated with a specific domain.
- The tool can perform reverse DNS lookups to identify the PTR record associated with an IP address.
- It includes an option to brute force or guess the hostnames or IPs of machines on a local network segment.
- DNS cache snooping and analysis can be performed to reveal cached information about a target's DNS records.
dnsrecon
allows output in various formats, making it easy to integrate with other tools or scripts for further analysis.
List of commands for dnsrecon:
-
dnsrecon:tldr:130ad dnsrecon: Scan a domain, using a brute-force attack and a dictionary of subdomains and hostnames.$ dnsrecon --domain ${example-com} --dictionary ${path-to-dictionary-txt} --type brttry on your machineexplain this command
-
dnsrecon:tldr:145b0 dnsrecon: Scan a domain, performing DNS cache snooping.$ dnsrecon --domain ${example-com} --type snoop --name_server ${nameserver-example-com} --dictionary ${path-to-dictionary-txt}try on your machineexplain this command
-
dnsrecon:tldr:6f32b dnsrecon: Scan a domain, specifying the nameserver and performing a zone transfer.$ dnsrecon --domain ${example-com} --name_server ${nameserver-example-com} --type axfrtry on your machineexplain this command
-
dnsrecon:tldr:84655 dnsrecon: Scan a domain, performing zone walking.$ dnsrecon --domain ${example-com} --type zonewalktry on your machineexplain this command
-
dnsrecon:tldr:ba008 dnsrecon: Scan a domain, performing a reverse lookup of IP ranges from the SPF record and saving the results to a JSON file.$ dnsrecon --domain ${example-com} -s --jsontry on your machineexplain this command
-
dnsrecon:tldr:da6c3 dnsrecon: Scan a domain and save the results to a SQLite database.$ dnsrecon --domain ${example-com} --db ${path-to-database-sqlite}try on your machineexplain this command
-
dnsrecon:tldr:da9da dnsrecon: Scan a domain, performing a Google enumeration and saving the results to a CSV file.$ dnsrecon --domain ${example-com} -g --csvtry on your machineexplain this command