Dnsenum
Jump to navigation
Jump to search
dnsenum[edit | edit source]
dnsenum is an open-source Perl script that performs comprehensive DNS enumeration for penetration testing and security auditing. The tool discovers subdomains, attempts zone transfers, performs reverse lookups, harvests search-engine data, and exports results in multiple formats.
Common Options[edit | edit source]
Enumeration & Discovery[edit | edit source]
Option | Description |
---|---|
--enum |
Full enumeration: registrar info, DNS records, zone transfer attempt, subdomain brute-force, reverse lookup |
-d [DOMAIN] |
Target domain (required) |
--dnsserver [SERVER] |
Use specific DNS resolver |
-f [FILE] |
Wordlist for subdomain brute-force |
--threads [NUM] |
Number of concurrent threads during brute-force |
-r [CIDR] |
Reverse lookup for an IP range (CIDR) |
-l [FILE] |
List of domains for batch processing |
Output[edit | edit source]
Option | Description |
---|---|
-o [FILE] |
Save results in XML format |
-p [FILE] |
Save results in CSV format |
-u [FILE] |
Save results in plain text |
--xml |
Display output in XML on screen |
-v |
Increase verbosity (stackable: -vv , -vvv )
|
Examples[edit | edit source]
Basic Enumeration[edit | edit source]
dnsenum --enum example.com
Use Custom DNS Resolver[edit | edit source]
dnsenum --dnsserver 8.8.8.8 -d example.com
Subdomain Brute-Force with Wordlist[edit | edit source]
dnsenum -d example.com -f subdomains.txt --threads 20
Reverse Lookup on /24 Range[edit | edit source]
dnsenum -r 192.168.1.0/24 -o results.xml
Batch Mode for Multiple Domains[edit | edit source]
dnsenum -l domains.txt -p report.csv
Output Fields[edit | edit source]
- A, AAAA, MX, NS, TXT records
- Registrar and Name Server information
- Subdomain list (dictionary and search-engine discovery)
- Zone transfer results
- Reverse lookup hostnames
- Output in CSV, XML, Text for further parsing