官术网_书友最值得收藏!

How to do it...

  1. To view the help, we type the following:
dnsrecon -h

The following screenshot shows the output of the preceding command:

  1. To do a simple recon of name servers, A records, SOA records, MX records, and so on, we can run the following command:
dnsrecon -d packtpub.com -n 8.8.8.8

The following screenshot shows the output of the preceding command:

  1. Now let's take an example of a domain that has NSEC records. To do a zone walk, we can simply run the following command:
dnsrecon -z -d icann.org -n 8.8.8.8

The following screenshot shows the output of the preceding command:

  1. We can do this manually by using the dig command along with dig +short NSEC domainname.com.
  2. The previous dig command will throw us one subdomain, and then we can rerun the same command with the subdomain we got in previous step to find the next subdomain: dig +short NSEC a.domain.com.
主站蜘蛛池模板: 武宁县| 鹰潭市| 邹城市| 嵊泗县| 桃园市| 台东市| 古浪县| 夏河县| 清苑县| 桐城市| 乳山市| 都匀市| 邯郸县| 宜春市| 玉林市| 镇雄县| 衡水市| 陈巴尔虎旗| 斗六市| 龙陵县| 海丰县| 揭西县| 宣威市| 正镶白旗| 界首市| 黄冈市| 丰顺县| 瑞金市| 福清市| 青冈县| 平泉县| 花莲市| 三门峡市| 缙云县| 嘉黎县| 鄢陵县| 景宁| 宜城市| 栾城县| 盐边县| 安义县|