

By trying each entry in the file tool will resolve the A, AAA, and CNAME records against the domain provided. Perform DNS brute force: A file containing a list of names is provided to the tool. However, you cannot use it today because of the implementation of security controls by organizations. Perform DNS zone transfer: the use of this technique can obtain paramount information. Online tools are also available like but have a limitation to 100 domains only. It can automatically transfer to Brute-force from DNS zone transfer. This tool is used to enumerate DNS information and to discover non-contiguous IP blocks. It was developed by Paterva and is used for open-source intelligence and forensics.
EXAMPLE OF REVERSE ZONE SIMPLE DNS PLUS DOWNLOAD
This tool is also available in kali, and you can download it from the following link Maltego: It is used to gather DNS information and was developed by a python script. The following are some tools for DNS Reconnaissance. To gather DNS information, different tools are available. So, the types of enumeration that perform include zone transfers reverse lookups domain and host brute force standard record, enumeration, catch snooping, zoom working, and also Google Luca. This is only possible for those networks or organizations that do not check upon the DNS traffic. It does not affect any IP addresses therefore, it is best to use for checking on or disclose the information of any network. It can gather and collect all types of information on the records and target server. It is used where penetration testing is being performed. DNS Reconnaissance is an information-gathering part for a penetration testing.
