官术网_书友最值得收藏!

How to do it...

  1. To view the help, we type the following:
dnsrecon -h

The following screenshot shows the output of the preceding command:

  1. To do a simple recon of name servers, A records, SOA records, MX records, and so on, we can run the following command:
dnsrecon -d packtpub.com -n 8.8.8.8

The following screenshot shows the output of the preceding command:

  1. Now let's take an example of a domain that has NSEC records. To do a zone walk, we can simply run the following command:
dnsrecon -z -d icann.org -n 8.8.8.8

The following screenshot shows the output of the preceding command:

  1. We can do this manually by using the dig command along with dig +short NSEC domainname.com.
  2. The previous dig command will throw us one subdomain, and then we can rerun the same command with the subdomain we got in previous step to find the next subdomain: dig +short NSEC a.domain.com.
主站蜘蛛池模板: 会泽县| 临桂县| 张家口市| 中西区| 平罗县| 靖州| 体育| 科技| 扶沟县| 井研县| 正蓝旗| 舒城县| 武邑县| 新蔡县| 岐山县| 耒阳市| 四子王旗| 成都市| 冀州市| 许昌市| 酒泉市| 正蓝旗| 宁德市| 临湘市| 江达县| 德阳市| 和政县| 长兴县| 金门县| 岑溪市| 岫岩| 宁化县| 洪江市| 来安县| 大埔县| 沙雅县| 白河县| 泸水县| 谢通门县| 墨竹工卡县| 泰和县|