Port 53 - DNS
Nmap:
nmap --script=dns-zone-transfer -p 53 ns2.megacorpone.com
Dig:
dig any domain.name $IP
dig axfr domain.name $IP
nslookup
Forward Lookup Brute Force
for ip in $(cat /usr/share/seclists/Discovery/DNS/subdomains-top1million-5000.txt); do host $ip.megacorpone.com; done | grep -v "not found"
Reverse Lookup Brute Force
(Useful if a range was found and it's possible there are hostnames within that range that are not on your wordlist from the forward lookup)
for ip in $(seq 50 240); do host 51.222.169.$ip; done | grep -v "not found"
DNS Zone Transfer:
(This makes a copy of the DNS file and should never be allowed, so it represents a severe misconfiguration)
host -l megacorpone.com ns2.megacorpone.com
Last updated