Tools

Enumeration

# DNS 서버 소프트웨어의 버전을 확인, 알려진 취약점이 있는지 찾는다
dig version.bind chaos txt @$IP

# 서버로 부터 특정 도메인의 NS 레코드를 질의
dig ns $DOMAIN @$DNS_SERVER_IP

# View all available records
dig any $DOMAIN @$DNS_SERVER_IP

# Query a DNS server's version using a class CHAOS query and type TXT
dig CH TXT version.bind @$DNS_SERVER_IP

Zone Transfer

dig axfr $DOMAIN @$DNS_SERVER_IP
dig axfr wook.com @$IP
dig axfr internal.wook.com @$IP

Subdomain Brute Forcing

Script

for sub in $(cat /opt/useful/seclists/Discovery/DNS/subdomains-top1million-110000.txt);do dig $sub.<domain> @<DNS server IP> | grep -v ';\\\\|SOA' | sed -r '/^\\\\s*$/d' | grep $sub | tee -a subdomains.txt;done

dnsenum

dnsenum --dnsserver <DNS server IP> --enum -p 0 -s 0 -o subdomains.txt -f /usr/share/seclists/Discovery/DNS/subdomains-top1million-110000.txt <domain>