dnsrecon
Author description - DNSRecon is a Python port of a Ruby script that I wrote to learn the language and about DNS in early 2007. This time I wanted to learn about Python and extend the functionality of the original tool and in the process re-learn how DNS works and how could it be used in the process of a security assessment and network troubleshooting. This tool provides the ability to perform: Check all NS Records for Zone Transfers; Enumerate General DNS Records for a given Domain (MX, SOA, NS, A, AAAA, SPF and TXT); Perform common SRV Record Enumeration; Top Level Domain (TLD) Expansion; Check for Wildcard Resolution; Brute Force subdomain and host A and AAAA records given a domain and a wordlist; Perform a PTR Record lookup for a given IP Range or CIDR; Check a DNS Server Cached records for A, AAAA and CNAME Records provided a list of host records in a text file to check.
Details
Category: Recon
Publisher: trickest-mhmdiaa
Created Date: 6/7/2022
Container: quay.io/trickest/dnsrecon:e1b742e
Source URL: https://github.com/darkoperator/dnsrecon
Parameters
-a
- Perform AXFR with standard enumeration.-d
- Target domain-f
- Filter out of brute force domain lookup, records that resolve to the wildcard defined IP address when saving records.--threads
- Number of threads to use in reverse lookups, forward lookups, brute force and SRV record enumeration.--lifetime
- Time to wait for a server to respond to a query. Default is 3.--tcp
- Use TCP protocol to make queries.-r
- IP range for reverse lookup brute force in formats (first-last) or in (range/bitmask).-n
- Domain server to use. If none is given, the SOA of the target will be used. Multiple servers can be using a comma separated list.-v
- Enable verbose.-w
- Perform deep whois record analysis and reverse lookup of IP ranges found through Whois when doing a standard enumeration.-k
- Perform crt.sh enumeration with standard enumeration.-D
- Dictionary file of subdomain and hostnames to use for brute force. Filter out of brute force domain lookup, records that resolve to the wildcard defined IP address when saving records.-b
- Perform Bing enumeration with standard enumeration.-z
- Performs a DNSSEC zone walk with standard enumeration.-t
- Type of enumeration to perform. Possible types: std, rvl, srv, axfr, bing, yand, snoop, tld, and zonewalk-y
- Perform Yandex enumeration with standard enumeration.-s
- Perform a reverse lookup of IPv4 ranges in the SPF record with standard enumeration.--iw
- Continue brute forcing a domain even if a wildcard record is discovered.--disable-check-recursion
- Disables check for recursion on name servers.--disable-check-bindversion
- Disables check for BIND version on name servers.