dnsrecon
comprehensive DNS reconnaissance tool
TLDR
SYNOPSIS
dnsrecon [options]
DESCRIPTION
dnsrecon is a comprehensive DNS reconnaissance tool that performs multiple enumeration techniques to map DNS infrastructure. It combines zone transfers (AXFR), brute-force subdomain discovery, cache snooping, DNSSEC zone walking, and reverse lookups into a single tool.The tool supports various scan types: standard enumeration, zone transfers to extract complete zone data, brute-force with custom dictionaries to discover subdomains, cache snooping to check for cached records on nameservers, and DNSSEC zone walking which exploits NSEC records to enumerate zones. Results can be exported to multiple formats including JSON, CSV, and SQLite databases for analysis. It can also perform Google enumeration to find subdomains through search engine results and SPF record analysis to discover related IP ranges. Widely used in penetration testing and security assessments to thoroughly map an organization's DNS footprint.
PARAMETERS
-d, --domain DOMAIN
Target domain.-n, --name_server NSSERVER_
Domain server to use. If none is given, the SOA of the target will be used.-r, --range RANGE
IP range for reverse lookup brute force in formats (first-last) or (range/bitmask).-t, --type TYPE
Enumeration type: std, rvl, brt, srv, axfr, bing, yand, crt, snoop, tld, zonewalk.-D, --dictionary DICTIONARY
Dictionary file of subdomain and hostnames to use for brute force.-a
Perform AXFR with standard enumeration.-s
Perform reverse lookup of IPv4 ranges in the SPF record with standard enumeration.-z
Perform DNSSEC zone walk with standard enumeration.-f
Filter out wildcard-resolved records from brute force results.--threads THREADS
Number of threads to use for parallel processing.--lifetime LIFETIME
Time in seconds to wait for a server to respond to a query (default: 3).--tcp
Use TCP protocol to make queries.-j, --json JSON
JSON file to save found records.-c, --csv CSV
Comma separated value file to save found records.-x, --xml XML
XML file to save found records.--db DB
SQLite 3 file to save found records.-v
Enable verbose output.-V
Display version information.
CAVEATS
Use only against authorized targets. Zone transfers are often blocked by nameservers. Brute-force can be slow depending on dictionary size. Google enumeration may be rate-limited.
