Select Page

DNSENUM, DNSTracer, DNSMAP tools

Ethical Hacking

DNSENUM

DNSENUM is a DNS enumeration tool included in Kali Linux, used for gathering information about a target domain. It performs various tasks such as:

  • Enumerating DNS records (A, MX, NS, etc.).
  • Retrieving and displaying the domain’s nameservers and mail servers.
  • Performing zone transfers (if allowed by the server).
  • Enumerating subdomains using dictionary-based brute force.
  • Collecting information about reverse lookups for IP address ranges.

dnsenum is useful in penetration testing for gathering DNS-related data and discovering potential points of entry during the reconnaissance phase.

DNSTracer

DNSTracer is a command-line tool used to trace the path that DNS queries take through the DNS hierarchy. It is designed to track DNS queries from the root servers down to the authoritative name server for a domain.

Here’s what DNSTracer does:

  • Tracing DNS Resolution Path: It follows the query resolution from the root DNS servers down to the specific authoritative DNS server for the target domain.
  • Displaying Each DNS Hop: It shows each step of the DNS resolution process, including intermediate servers, allowing for the identification of delays or issues in the DNS chain.
  • Troubleshooting DNS Issues: It can help network administrators troubleshoot slow DNS queries, misconfigured name servers, or DNS propagation issues.

In penetration testing, it is useful for understanding the DNS infrastructure of a target, as well as identifying DNS servers that might be vulnerable or misconfigured.

DNSMAP

DNSMAP is a DNS reconnaissance tool designed to perform passive subdomain enumeration and DNS mapping for a given domain. It is useful for gathering information about a target’s DNS infrastructure during the reconnaissance phase of penetration testing.

Here’s what DNSMAP does:

  • Subdomain Discovery: It uses a wordlist to brute-force and discover subdomains related to the target domain.
  • DNS Information Gathering: It maps out DNS servers, resolving discovered subdomains to their corresponding IP addresses.
  • Passive DNS Enumeration: Focuses on collecting DNS records without directly interacting with the target’s DNS servers, minimizing the likelihood of detection.
  • Network Mapping: Helps in understanding the structure and relationships within a domain’s DNS infrastructure.

DNSMAP is often used in the early stages of penetration testing to identify subdomains and potential attack surfaces related to a target domain.

Latest Post:

Pin It on Pinterest