Latest News

How to use dnsenum in Kali Linux

DNSenum – This tool is programmed by perl. DNSenum is a tool that it was designed with the purpose of enumerating DNS information about a domain. We can get information by using dnsenum tool –

  • Get the host's addresse
  • Get the namservers
  • Get the MX record
  • Trying Zone Transfers
  • BIND Version
  • Get extra names and subdomains via google scraping
  • Brute force subdomains from file, can also perform recursion on subdomain that have NS records
  • Perform reverse lookups on netranges
  • Write to domain_ips.txt file ip-blocks

1.  How to open Dnsenum
   a. GUI method – Application → information Gathering → DNS Analysis → dnsenum
(click image for large view)

b. open terminal type dnsenum and hit enter kindly read all commands. This will make you more smart geeky.

2. In terminal type dnsenum domain and hit enter for ex- dnsenum after pressing enter you will see all the information like Host’s Address, Name servers, MX , Zone transfer etc.
Note – do not add www. With domain

3. Extra names and subdomains via google scraping – most of time this is not working with all domains. Open Terminal and type dnsenum -p 5 -s 20 domain 
Ex - dnsenum -p 5 -s 20
Here - 
-p = pages <value>
The number of google search pages to process when scraping names, the default is 20 pages, the -s switch must be specified.
-s = scrap <value>
The maximum number of subdomains that will be scraped from google.
Notes: Since this is not functional you can manually run the command in a Google search: “allinurl: -www site:Domain name”

4. Brute force subdomains open terminal and type dnsenum -f dns.txt domain
Ex - dnsenum -f dns.txt
Here -
-f, = file <file>
Read subdomains from this file to perform brute force.
(click image for large view)
If you like my post please comment

No comments:

Post a Comment

Contact Us

24x7 online , we happy to answer you , ,
skype: greeenchip


This Blog and its TUT's are intended for educational purposes only, no-one involved in the creation of this TuT may be held responsible for any illegal acts brought about by this Blog or TuT.

Featured Post

Custom Domains And HTTPS Redirection Code