Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/darkoperator/dnsrecon
DNS Enumeration Script
https://github.com/darkoperator/dnsrecon
Last synced: 2 days ago
JSON representation
DNS Enumeration Script
- Host: GitHub
- URL: https://github.com/darkoperator/dnsrecon
- Owner: darkoperator
- License: gpl-2.0
- Created: 2010-12-16T03:25:49.000Z (almost 14 years ago)
- Default Branch: master
- Last Pushed: 2024-10-29T11:06:58.000Z (about 1 month ago)
- Last Synced: 2024-10-29T15:07:54.840Z (about 1 month ago)
- Language: Python
- Homepage:
- Size: 1.33 MB
- Stars: 2,627
- Watchers: 94
- Forks: 541
- Open Issues: 9
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
- awesome-termux-hacking - dnsrecon - DNS Enumeration Script.[![->](https://img.shields.io/github/stars/darkoperator/dnsrecon.svg?style=social&label=Star&maxAge=2592000)](https://github.com/darkoperator/dnsrecon/stargazers/) (Uncategorized / Uncategorized)
- starred-awesome - dnsrecon - DNS Enumeration Script (Python)
- awesome-hacking-lists - darkoperator/dnsrecon - DNS Enumeration Script (Python)
- awesome-cyber-security - DNSRecon - A DNS reconnaissance tool that performs various DNS enumeration techniques. (Tools / Network Pentesting)
- awesome-cyber-security - DNSRecon - A DNS reconnaissance tool that performs various DNS enumeration techniques. (Tools / Network Pentesting)
README
# DNSRecon
DNSRecon is a Python port of a Ruby script that I wrote to learn the language and about DNS in early 2007.
This time I wanted to learn about Python and extend the functionality of the original tool and in the process re-learn how DNS works and how could it be used in the process of a security assessment and network troubleshooting.This script provides the ability to perform:
* Check all NS Records for Zone Transfers.
* Enumerate General DNS Records for a given Domain (MX, SOA, NS, A, AAAA, SPF and TXT).
* Perform common SRV Record Enumeration.
* Top Level Domain (TLD) Expansion.
* Check for Wildcard Resolution.
* Brute Force subdomain and host A and AAAA records given a domain and a wordlist.
* Perform a PTR Record lookup for a given IP Range or CIDR.
* Check a DNS Server Cached records for A, AAAA and CNAME Records provided a list of host records in a text file to check.# Python Version
DNSRecon requires python3.6+