• Cybersecurity
  • Android
  • Apps
  • AI

Subscribe to Updates

Facebook Twitter Instagram
ZerosuniverseZerosuniverse
  • Cybersecurity
  • Android
  • Apps
  • AI
Facebook Twitter
ZerosuniverseZerosuniverse
Cybersecurity

What is DNS Enumeration

By zerosuniverse TeamJune 20, 2022
Facebook Twitter Pinterest LinkedIn Tumblr Email
DNS Enumeration

DNS Enumeration is the process of locating all the DNS servers and their corresponding records for an organization.DNS is like a map or an address book.

In fact, it is like a distributed database that is used to translate an IP address 192.111.1.120 to a name www.example.com and vice versa. 

DNS Enumeration is used to gather as many interesting details as possible about your target before initiating an attack. 

DNS servers can yield information such as usernames, computer names, and IP addresses of potential target systems.

DNS enumeration is done to find large amounts of information. The DNS system often holds various types of data associated with a domain.  

Ad
Ad
Ad

Information gathered by DNS Enumeration can be used by an attacker in various breaches, especially while initiating DNS Tunneling. 

DNS Zone Transfer is used to replicate DNS data across a number of DNS servers or to back up DNS files. A user or server will perform a specific zone transfer request from a ―name server.

If the name server allows zone transfers by an anonymous user to occur, all the DNS names and IP addresses hosted by the name server will be returned in human-readable ASCII text.

Tools used for DNS Enumeration

  • maltego
  • dnenum
  • recon-ng
  • dnsrecon
  • theHarvester
  • nslookup

You can use nslookup command available on Linux to get DNS and host-related information. In addition, you can use the following DNSenum script to get detailed information about a domain-DNSenum.plThe dnsenum script can perform the following important operations :

  1. Get the host’s addresses
  2. Get the nameservers
  3. Get the MX record
  4. Perform axfr queries on nameservers
  5. Get extra names and subdomains via Google scraping
  6. Brute force subdomains from a file can also perform recursion on a subdomain that has NS records.
  7. Calculate C class domain network ranges and perform whois queries on them
  8. Perform reverse lookups on entrances

If your DNS is not configured in a secure way, it is possible that lots of sensitive information about the network and organization can go outside and an untrusted Internet user can perform a DNS zone transfer.

Ad
Ad
Ad
dns Enumeration
Share. Facebook Twitter Pinterest Email
zerosuniverse Team
  • Facebook
  • Twitter

We’re dedicated to giving you the very best of the latest Tricks and topics related trends with insightful analysis on hardware, software, mobile computing,Cybersecurity, Android, AI technology & many more.

Related Posts

Hacking TV Shows

10 Best Hacking TV Shows To Watch in 2023

Female-Hackers

Top 10 Female Hackers in 2023

IP Address Grabbers

5 Best IP Address Grabbers in 2023

Cybersecurity Tools

10 Best Cybersecurity Tools To use in 2023

Add A Comment

Comments are closed.

Trending Now

Android Keylogger

7 Best Android Keylogger Spy App for 2023

wifi-hacking-apps-android

16 Best WiFi Hacking Apps For Android in 2023

Games-Hacking

15 Best Games Hacking Apps for Android in 2023

Rooting-apps

10 Best Rooting Apps For Android in 2023

Password managers

10 Best Password Managers for 2023

Vpn Apps

10 Best Vpn Apps for Android in 2023

cybersecurity-courses

20 Best Cybersecurity courses in 2023

dating-apps

10 Best dating apps to find Perfect love in 2023

anime apps

10 Best Anime Apps for Android & iPhone in 2023

Crypto Trading Apps

10 Best Crypto Trading Apps For Android & ios in 2023

Facebook Twitter Pinterest Tumblr LinkedIn
  • About
  • Contact
  • Guest Post
  • Disclaimer
  • Privacy
© 2022 Zerosuniverse.com | All Rights Reserved.

Type above and press Enter to search. Press Esc to cancel.