Feb. 29, 2024, 8:57 p.m. | Abdul Issa

InfoSec Write-ups - Medium infosecwriteups.com

An Introduction to DNS Enumeration Tools and Techniques

DNS Enumeration

· Introduction
· DNS Enumeration Tools and Techniques
Nslookup
Host
Dig
Fierce
WHOIS
DNSEnum
Knockpy
Subfinder
Sublist3r
DNSRecon
Amass
Recon-NG
theHarvester
Nmap
Metasploit
· Conclusion
· Further Reading

Greetings, Cyber Mavericks!

This article is the first of a series of articles covering the use of DNS enumeration during the reconnaissance, exploitation, and post-exploitation phases …

amass article beginner cyber dig dns dnsrecon enumeration ethical hacking guide host introduction metasploit nmap penetration testing penetration testing tools recon reconnaissance s guide techniques tools whois

Information Security Engineers

@ D. E. Shaw Research | New York City

Technology Security Analyst

@ Halton Region | Oakville, Ontario, Canada

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

Senior - Penetration Tester

@ Deloitte | Madrid, España

Associate Cyber Incident Responder

@ Highmark Health | PA, Working at Home - Pennsylvania

Senior Insider Threat Analyst

@ IT Concepts Inc. | Woodlawn, Maryland, United States