LinuxCommandLibrary

fierce

DNS reconnaissance and subdomain discovery tool

TLDR

DNS reconnaissance on domain

$ fierce --domain [example.com]
copy
Use custom DNS server
$ fierce --domain [example.com] --dns-servers [8.8.8.8]
copy
Search with wordlist
$ fierce --domain [example.com] --subdomain-file [wordlist.txt]
copy
Expand search range
$ fierce --domain [example.com] --wide
copy
Output to file
$ fierce --domain [example.com] > [output.txt]
copy

SYNOPSIS

fierce [options]

DESCRIPTION

fierce is a DNS reconnaissance tool that locates non-contiguous IP space and hostnames for a target. It performs zone transfers, subdomain brute forcing, and adjacent IP discovery.
The tool attempts DNS zone transfers first, then falls back to dictionary-based subdomain enumeration. When hosts are found, it scans nearby IP addresses to discover additional systems.
fierce is used in penetration testing for initial target enumeration and attack surface mapping.

PARAMETERS

--domain DOMAIN

Target domain to scan.
--dns-servers SERVERS
Custom DNS servers.
--subdomain-file FILE
Wordlist for subdomain bruteforce.
--wide
Scan entire class C of found hosts.
--traverse N
Scan adjacent IPs.
--delay SEC
Delay between queries.
--help
Display help information.

CAVEATS

Only use against authorized targets. Zone transfers usually fail on properly configured servers. DNS queries may be logged.

HISTORY

fierce was created by RSnake (Robert Hansen) as a DNS reconnaissance tool for penetration testers. The Python 3 rewrite modernized the original Perl script for current security workflows.

SEE ALSO

dig(1), nmap(1), dnsenum(1)

> TERMINAL_GEAR

Curated for the Linux community

Copied to clipboard

> TERMINAL_GEAR

Curated for the Linux community