DNS Enumeration (Port 53)

Quick Intro

  • DNS enumeration is the process of identifying the DNS servers and the corresponding DNS records. DNS stands for Domain Name System which is a database containing information about domain names and their corresponding IP addresses. The DNS system is responsible for translating human-readable hostnames into machine-readable IP addresses. The most important records to look for in DNS enumeration are the:

  • A (address) records containing the IP address of the domain.

  • MX records, which stands for Mail Exchange, contain the mail exchange servers.

  • CNAME records used for aliasing domains. CNAME stands for Canonical Name and links any sub-domains with existing domain DNS records.

  • NS records, which stands for Name Server, indicates the authoritative (or main) name server for the domain.

  • SOA records, which stands for State of Authority, contain important information about the domain such as the primary name server, a timestamp showing when the domain was last updated and the party responsible for the domain.

  • PTR or Pointer Records map an IPv4 address to the CNAME on the host. This record is also called a ‘reverse record’ because it connects a record with an IP address to a hostname instead of the other way around.

  • TXT records contain text inserted by the administrator (such as notes about the way the network has been configured).

  • The information retrieved during DNS enumeration will consist of details about names servers and IP addresses of potential targets (such as mail servers, sub-domains etc). Some tools used for DNS enumeration included with Kali Linux are: whois, nslookup, dig, host and automated tools like Fierce, DNSenum and DNSrecon. Let’s briefly review these tools and see how we can use them for DNS enumeration.

general overview of different records

Whois

Nmap

Host

Domain scan

Find particular records

Reverse Domain Lookup

DNS Zone Transfer

DNS zone transfer, also known as DNS query type AXFR, is a process by which a DNS server passes a copy of part of its database to another DNS server. The portion of the database that is replicated is known as a zone.

Zone Transfer Script

Subdomain bruteforcing using common hostname

Reverse dns lookup bruteforcing

The ip is based on subdomain bruteforcing result

Nslookup

  • nslookup is used to query Internet name servers interactively

Running in intrective mode

Gathering information from specific DNS server

Dig

Domain scan

Asking for particular records

Sorting the output

Note - if particular type of information is not available , dig will give no output so don't think at that time that tool is not working xD

Reverse Domain Lookup

Zone Transfer

Automated Scanners

Fierce

Dnsenum

DnsRecon

Sub-Domain Enumeration

Ffuf

Sublist3r

Last updated