Information Gathering With dnsrecon-Backtrack 5 Rx
Wednesday, August 22, 2012
By
Kumar
backtrackhacking,
DNS Analysis,
dnsrecon usage tutorial,
linux
0
comments
dnsrecon is a tool for enumeration, coded in python.Features of dnsrecon:-
So Lets begin:-
- You can brute force Sub Domains by inbuilt wordlist or by your own wordlist.
- You can enumerate general record types, like SOA, NS, A, AAAA, MX and SRV.
- You can Reverse Look Up a given CIDR IP range.
- You can test all NS Servers in a domain for misconfigured zone transfers.
- You can also search Sub domains through Google query.
- You can enumerate Top Level Domains.
In this tutorial we will only discuss:-
- std:- To enumerate general records types.
- srv:- To Enumerate records.
- axfr:- Test all NS Servers in a domain for misconfigured zone transfer.
- goo:- Search Sub Domains from Google.
- tld:- Enumerate Top Level Domains.
So Lets begin:-
- Open dnsrecon through Backtrack >> Information Gathering >> Network Analysis >> Dns Analysis >> dnsrecon and can also open through Terminal cd /pentest/enumeration/dns/dnsrecon
- For std, type ./dnsrecon.py -t std -d
- For srv, type ./dnsrecon.py -t srv -d
- For axfr, type ./dnsrecon.py -t axfr -d
- For goo, type ./dnsrecon.py -t goo -d
- For tld, type ./dnsrecon.py -t tld -d
Points to be noted:-
- -d is used for denoting domain.
- -t is used to specify, which type of enumerations you want to use.
This is only for Educational Purpose.
0 comments: