DNS Enumeration (Port 53)
Quick Intro
DNS enumeration is the process of identifying the DNS servers and the corresponding DNS records. DNS stands for Domain Name System which is a database containing information about domain names and their corresponding IP addresses. The DNS system is responsible for translating human-readable hostnames into machine-readable IP addresses. The most important records to look for in DNS enumeration are the:
A (address) records containing the IP address of the domain.
MX records, which stands for Mail Exchange, contain the mail exchange servers.
CNAME records used for aliasing domains. CNAME stands for Canonical Name and links any sub-domains with existing domain DNS records.
NS records, which stands for Name Server, indicates the authoritative (or main) name server for the domain.
SOA records, which stands for State of Authority, contain important information about the domain such as the primary name server, a timestamp showing when the domain was last updated and the party responsible for the domain.
PTR or Pointer Records map an IPv4 address to the CNAME on the host. This record is also called a ‘reverse record’ because it connects a record with an IP address to a hostname instead of the other way around.
TXT records contain text inserted by the administrator (such as notes about the way the network has been configured).
The information retrieved during DNS enumeration will consist of details about names servers and IP addresses of potential targets (such as mail servers, sub-domains etc). Some tools used for DNS enumeration included with Kali Linux are: whois, nslookup, dig, host and automated tools like Fierce, DNSenum and DNSrecon. Let’s briefly review these tools and see how we can use them for DNS enumeration.

Whois
Nmap
Host
Domain scan
Find particular records
Reverse Domain Lookup
DNS Zone Transfer
DNS zone transfer, also known as DNS query type AXFR, is a process by which a DNS server passes a copy of part of its database to another DNS server. The portion of the database that is replicated is known as a zone.
Zone Transfer Script
Subdomain bruteforcing using common hostname
Reverse dns lookup bruteforcing
The ip is based on subdomain bruteforcing result
Nslookup
nslookup is used to query Internet name servers interactively
Running in intrective mode
Gathering information from specific DNS server
Dig
Domain scan
Asking for particular records
Sorting the output
Note - if particular type of information is not available , dig will give no output so don't think at that time that tool is not working xD
Reverse Domain Lookup
Zone Transfer
Automated Scanners
Fierce
Dnsenum
DnsRecon
Sub-Domain Enumeration
Ffuf
Sublist3r
Last updated