DNS

From RCATs
Revision as of 13:18, 8 July 2023 by Ali3nw3rx (talk | contribs)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

COMMANDS

##NS request to the specific nameserver.
dig ns <domain.tld> @<nameserver>

##ANY request to the specific nameserver.
dig any <domain.tld> @<nameserver>

##AXFR request to the specific nameserver.
dig axfr <domain.tld> @<nameserver>

##Subdomain brute forcing.
dnsenum --dnsserver <nameserver> --enum -p 0 -s 0 -o found_subdomains.txt -f ~/subdomains.list <domain.tld>	

## brute force subdomain
for sub in $(cat /usr/share/wordlists/seclists/Discovery/DNS/subdomains-top1million-110000.txt);do dig $sub.inlanefreight.htb @10.129.97.191| grep -v ';\|SOA' | sed -r '/^\s*$/d' | grep $sub | tee -a subdomains.txt;done