fierce
DNS reconnaissance and subdomain discovery tool
TLDR
DNS reconnaissance on domain
SYNOPSIS
fierce [options]
DESCRIPTION
fierce is a DNS reconnaissance tool that locates non-contiguous IP space and hostnames for a target. It performs zone transfers, subdomain brute forcing, and adjacent IP discovery.
The tool attempts DNS zone transfers first, then falls back to dictionary-based subdomain enumeration. When hosts are found, it scans nearby IP addresses to discover additional systems.
fierce is used in penetration testing for initial target enumeration and attack surface mapping.
PARAMETERS
--domain DOMAIN
Target domain to scan.--dns-servers SERVERS
Custom DNS servers.--subdomain-file FILE
Wordlist for subdomain bruteforce.--wide
Scan entire class C of found hosts.--traverse N
Scan adjacent IPs.--delay SEC
Delay between queries.--help
Display help information.
CAVEATS
Only use against authorized targets. Zone transfers usually fail on properly configured servers. DNS queries may be logged.
HISTORY
fierce was created by RSnake (Robert Hansen) as a DNS reconnaissance tool for penetration testers. The Python 3 rewrite modernized the original Perl script for current security workflows.
