Information Gathering

DNS Enumeration

Passive Info Gathering

  • WHOIS (Extract IP, Servers, DNS, Registrar, Company, Emails, etc)

whois <target.com /  $IP>
https://whois.icann.org/en
http://who.is/
http://whois.domaintools.com/
https://whois.net/

Active Info Gathering

  • DNS Lookup (Extract DNS records like NS, MX, PTR, CNAME, SOA, AAAA.

host target.com
nslookup target.com
nslookup -type= <NS,MX,PTR,A,CNAME,SOA> target.com 
//Interactive Mode
nslookup
>set q=<ns,mx,ptr,a,cname,soa>
>target.com
dig target.com +short
dig target.com any
dig target.com <NS,MX,PTR,A,CNAME,SOA>
fierce -dns target.com
fierce -dns target.com --dnsserver <DNS Server>
dnsmap target.com
dnsrecon -d target.com
dmitry -iwnse target.com
  • Zone Transfers (Exploit misconfigurations by pretending to be slave to master DNS server which passes a copy of part of database and give out network info/topology, etc.)

  • Reverse Lookup (Find Netblocks, Owner, Organization)

  • IPv6 Enumeration

Last updated