PRIMARY CATEGORY → PROTOCOLS AND SERVICES
REFERENCES
Most Popular Types of DNS AttacksSee here

DNS → Domain Name System

Enumeration

NS Query

Query for All Available Nameservers

dig ns <DOMAIN> @<TARGET> +short
DIG

Query for DNS Server Version

dig CHAOS TXT version.bind @<TARGET> +short # Or CH
Nmap
nmap -p<DNS_PORT> --script dns-nsid -vvv -Pn <TARGET>
ANY Query

Query for All Available DNS Records

dig ANY <DOMAIN> @<TARGET>
Query for Specific DNS Records
A - AAAA
dig A <DOMAIN> @<TARGET>
dig AAAA <DOMAIN> @<TARGET>
MX
dig MX <DOMAIN> @<TARGET>
TXT
dig TXT <DOMAIN> @<TARGET>
CNAME
dig CNAME <DOMAIN> @<TARGET>

Zone Transfer

Asynchronous Full Transfer Zone
Dig
  • Only DNS Records’ value from DNS Answer
dig axfr @<TARGET> +short
dig axfr @<TARGET> <DOMAIN> +short
  • Full DNS Answer
dig axfr @<TARGET> +noall +answer
dig axfr @<TARGET> <DOMAIN> +noall +answer

Subdomains Enumeration

Tools
TOOL
DNSEnumSee here
FierceSee here
DNSReconSee here
AmassSee here
AssetFinderSee here
PureDNSSee here
Passive
Amass

Reference

  • Passive Mode
amass enum -passive -d <DOMAIN>
Subdomain BruteForce
Dig
while IFS= read -r _subdomain ; do printf "%s.<DOMAIN> -> %s\n" "$_subdomain" "$( dig "$_subdomain".<DOMAIN> @<RESOLVER> +short)" ; done < <WORDLIST>
Gobuster

Reference

gobuster dns --resolver <RESOLVER> --domain <DOMAIN> --wordlist <WORDLIST>
Amass
  • Active Mode
amass enum -active -brute -w <WORDLIST> -d <DOMAIN> -o <OUTPUT_FILE>
DNSEnum

Reference

dnsenum --enum <DOMAIN> -f <WORDLIST> -r