DNSRECON is a best Penetestration tool on Kali Linux for performing DNS Information gathering, we can gather almost each and every DNS information about our target using DNSRECON tool. We can perform different types of DNS enumerations using DNSRECON tool like standard enumeration, brute force enumeration, top level domain enumeration, Cache Snooping, DNS Zone walking etc.
There are a variety of tools available which will gather DNS info effectively however in this article we are going to focus on the DNSRecon that is a tool that was developed by carlos Perez and it is designed to perform DNS reconnaissance. This tool is included on backtrack and it is written in python.
DNS zone transfer may be used to expose topology. Specifically when a user is attempting to perform a zone transfer, he sends a DNS query to list all DNS info like name servers, host names, mx and CNAME records, zone serial number, Time to measure records etc. depending on the size and the type of a network, this may present significant security problem.
The shear amount of information that can be obtained through DNS zone transfer is staggering. DNS zone transfers are now-days usually turned of by default and i would be surprised if you are find one. still, DNSRecon provides the ability to perform Zone Transfers with the commands :-
./dnsrecon.py -d www.example.com -a or
./dnsrecon.py -d www.example.com -t axfr
DNSRecon can perform a reverse lookup for PTR (Pointer) records against IPv4 and IPv6 address ranges. To run reverse lookup enumeration use:
./dnsrecon.py -r 198.168.0.1 - 198.168.0.255(Start i.p - End i.p)
Also reverse lookup can be performed against all ranges in SPF records with the command.
/dnsrecon.py -d www.example.com -s.
For activity this method all we have to is to convey a name list and it will try to resolve the A,AAA and CNAME records against the domain by making an attempt every entry one by one. so as to run the domain name Brute-Force we need to type :-
./dnsrecon.py -d www.example.com -D namelist -t brt
As we can see we obtained A and CNAME records of the domain cnn.com and their IP addresses.
In order to perform standard DNS enumeration with the DNSRecon we have to use the following syntax:
./dnsrecon.py -d www.example.com
DNS cache snooping is occurred once the DNS server has a specific DNS record cached. This DNS record can usually reveal many information. However DNS cache snooping is not happening very often. The command that can be used in order to perform cache snooping is that the following:
./dnsrecon.py -t snoop -n Sever -D dict
This technique may unveils internal records if zone is not configured properly. The information that can be obtained can help us to map network hosts by enumerating the contents of a zone:
./dnsrecon.py -d host -t zonewalk
Step 1 : just type DnsRecon on the kali linux terminal.
Step 2 : Then Enter you Target Website that you want to do Subdomains Enumaration.
Here I have used "techtrick.in" for demo purpose.
dnsrecon -t std -d www.techtrick.in
Football Betting
I've been browsing on-line greater than three hours nowadays, yet I
never discovered any attention-grabbing article like yours.
It's pretty price enough for me. In my view,
if all website owners and bloggers made good content as you probably did,
the net will be much more useful than ever before.
14-Jul-2019
vps with seo tools installed review
Hey! I could have sworn I've been to this website before but after reading through some of the post I realized it's new to me.
Nonetheless, I'm definitely happy I found it and I'll be book-marking and checking back frequently!
31-Jul-2019
Lexus Ben Thanh
Nice post. I learn something new and challenging on sites I stumbleupon everyday.
It's always exciting to read through articles from other writers and
practice a little something from other sites.
18-Aug-2019