.. /dnsenum
Quick Usage
For this tool the run command is:
docker run -it --rm guidelacour/dnsenum ./dnsenum.pl <target_domain> --file dns.txt
Categories
reconscanner
Description
multithreaded perl script to enumerate DNS information of a domain and to discover non-contiguous ip blocks.
OPERATIONS:
-
Get the host's addresse (A record).
-
Get the namservers (threaded).
-
Get the MX record (threaded).
-
Perform axfr queries on nameservers and get BIND VERSION (threaded).
-
Get extra names and subdomains via google scraping (google query = "allinurl: -www site:domain").
-
Brute force subdomains from file, can also perform recursion on subdomain that have NS records (all threaded).
-
Calculate C class domain network ranges and perform whois queries on them (threaded).
-
Perform reverse lookups on netranges ( C class or/and whois netranges) (threaded).
-
Write to domain_ips.txt file ip-blocks.
Cheatsheat
Custom bruteforce file
docker run -it --rm -v <wordlist_src_dir>:/wordlists guidelacour/dnsenum ./dnsenum.pl <target_domain> --file /wordlists/<wordlist_file>
Custom output
docker run -it --rm -v <output_dir>:/output guidelacour/dnsenum ./dnsenum.pl <target_domain> --file dns.txt --out /output/outfile
Official Documentation
Reference: https://github.com/fwaeytens/dnsenum/