DNS Recon

DNS Enumeration Cheat Sheet: Mastering DNS Reconnaissance

DNS enumeration is a crucial step in the reconnaissance phase of penetration testing and cybersecurity assessments. By querying Domain Name System (DNS) servers, security professionals can gather valuable information about target networks, including hostnames, IP addresses, mail servers, and more. This cheat sheet provides a comprehensive guide to DNS enumeration techniques and commands for effective reconnaissance.

1. Basic DNS Queries:

  • Query A Records (IPv4 Addresses):
  nslookup <domain>
  • Query AAAA Records (IPv6 Addresses):
  nslookup -query=AAAA <domain>
  • Query MX Records (Mail Exchangers):
  nslookup -query=MX <domain>
  • Query NS Records (Name Servers):
  nslookup -query=NS <domain>
  • Query SOA Records (Start of Authority):
  nslookup -query=SOA <domain>

2. Zone Transfer Enumeration:

  • Perform Zone Transfer (AXFR):
  dig @<nameserver> <domain> AXFR
  • Enumerate DNS Records with DNSRecon:
  dnsrecon -d <domain>

3. DNS Information Gathering:

  • Brute Force Subdomains with Sublist3r:
  python sublist3r.py -d <domain>
  • Discover Subdomains with Amass:
  amass enum -d <domain>
  • Query DNS Records Recursively:
  dig +recurse +short <domain>

4. DNS Enumeration Tools:

  • DNSenum: Perform comprehensive DNS enumeration with DNSenum.
  dnsenum <domain>
  • Fierce: Brute force DNS subdomains and perform zone transfers with Fierce.
  fierce -dns <domain>
  • Nmap DNS Enumeration Script:
  nmap --script dns-*

5. Additional DNS Reconnaissance Techniques:

  • Query TXT Records for SPF Information:
  nslookup -query=TXT <domain>
  • DNS Cache Snooping:
  dig @<nameserver> <domain> ANY
  • DNSSEC Zone Walking:
  dig @<nameserver> <domain> -t NSEC

6. Online DNS Enumeration Tools:

  • DNS Dumpster: Explore DNS history and discover associated domains.
  • SecurityTrails: Investigate DNS history, subdomains, and WHOIS information.
  • Censys: Search for DNS records and associated subdomains.

7. DNS Enumeration Best Practices:

  • Perform Targeted Queries: Query specific DNS record types to gather relevant information.
  • Check for Zone Transfers: Test DNS servers for misconfigurations that allow unauthorized zone transfers.
  • Combine Techniques: Use a combination of DNS enumeration tools and techniques for comprehensive reconnaissance.
  • Respect Legal and Ethical Boundaries: Obtain proper authorization before conducting DNS enumeration activities.

With this DNS enumeration cheat sheet at your disposal, you’ll be equipped to conduct thorough reconnaissance and gather valuable intelligence during penetration testing and cybersecurity assessments. Remember to approach DNS enumeration with caution and respect for legal and ethical boundaries. Happy hunting!