当前位置:网站首页>Kali system -- dnsrecon for DNS collection and analysis
Kali system -- dnsrecon for DNS collection and analysis
2022-06-13 00:30:00 【P1n9】
1> function :
DNS Reconnaissance is an important part of penetration test information collection .DNS Reconnaissance is to get from DNS In the records returned by the server , For more information . Don't trigger IDS/IPS You can get information about network facilities . Most companies do not monitor DNS The server , It will only monitor whether there is a zone transfer vulnerability .
There are already many tools available on the Internet to collect DNS Information , This article introduces DNSRecon, from Carlos Perez use Python Development , be used for DNS scout .
This tool can complete the following operations :
Area transmission ---- Zone Transfer
Reverse query ---- Reverse Lookup
A violent guess ---- Domain and Host Brute-Force
Standard record enumeration ---- Standard Record Enumeration (wildcard,SOA,MX,A,TXT etc.)
cache snooping ---- Cache Snooping
Area traversal ---- Zone Walking
Google Inquire about ---- Google Lookup
2>
-h, --help Print help and exit
-d, --domain <domain> Target domain name
-r, --range <range> For a given format IP The scope of blasting , The format is ( Start IP- end IP) or ( Range / Mask ).
-n, --name_server <name> Specify a domain name server
-D, --dictionary <file> The subdomain name and hostname dictionary file used to explode
-f Ignore enum field lookup results when saving results
-t, --type <types> Specify enumeration type :
std If NS Domain transfer failed for server , Conduct SOA、NS、A、AAAA、MX and SRV Enumeration ( You have to use -d Parameter specifies the domain name to use this parameter )
rvl For given IP Scope or CIDR Reverse lookup ( You have to use -r Appoint IP Range )
brt Use the specified dictionary to explode the domain name and host name
srv enumeration SRV Record
axfr For all the NS The server performs a domain transfer test
goo For subdomains and host Conduct Google Search for
snoop Yes -D Options given in the file DNS Server cache detection
tld Delete... For the given domain TLD And test on IANA All registered in TLD
zonewalk Use NSEC Recording DNSSEC Domain roaming
-a Carry out spatial domain transfer test in the standard enumeration process
-s In the standard enumeration process IP Reverse lookup of address range
-g In the process of standard enumeration Google enumeration
-w Depth in the process of standard enumeration whois Query and IP The check
-z In the process of standard enumeration DNSSEC Domain roaming
--threads <number> Specified number of threads
--lifetime <number> Specify the time to wait for the query
--db <file> Store the results as sqlite3 Database files
--xml <file> Store the results as XML File format
--iw Even if wildcards are found, they still explode
-c, --csv <file> CSV File format
-j, --json <file> json file
-v Show the process of blasting
3> experiment :
For given IP Perform domain name reverse query in the scope 
边栏推荐
- Basics of network security (1)
- Distributed lock implementation
- Lambda expression
- PMP training organization
- Another year 1024, happy programmer's Day!
- MySQL index
- C language standard IO, for example: fread(), fwrite(), fgetc(), etc. (end)
- ucore lab2
- Interprocess communication - shared memory shmat
- VHDL programming experiment exercises collection
猜你喜欢

MASA Auth - 从用户的角度看整体设计

PMP registration conditions, time, cost, new version related information

63. different paths II

A detailed explanation of synchronized

Test platform series (97) perfect the case part
![[matlab] matrix](/img/15/da3b530fca50080392c89e91998526.png)
[matlab] matrix

1. Google grpc framework source code analysis Hello World

PLC can also make small games ----- CoDeSys can write small games of guessing numbers

浏览器缓存的执行流程

Using fastjson to solve the problem of returning an empty array from a null value of a field string object
随机推荐
PLC也能制作小遊戲----Codesys編寫猜數字小遊戲
New blog address
The origin of MySQL in bedtime stories
Tsinghua Bosch joint ml center, thbi lab:cheng Yang Ying | realize safety reinforcement learning through the value at risk of constraints
What occupation is suitable for PMP?
Delphi2009 connecting Oracle11g
Is the brokerage account in qiniu business school safe? Is the account opening rate low
在 Golang 中构建 CRUD 应用程序
How to visit a website
6.824 Lab 3B: Fault-tolerant Key/Value Service
The whole process from entering URL to displaying page (interview)
[matlab] matrix operation
MySQL finds duplicate data based on one or more fields
Basics of network security (1)
Is the PMP training organization an actual training?
2022美容师(技师)上岗证题目及答案
BUUCTF之BabyUpload[GXYCTF2019]
Several interview questions in TCP three grips and four swings
PLC也能制作小游戏----Codesys编写猜数字小游戏
The e-commerce employee changed the product price to 10% off after leaving the company, and has been detained