Feb. 29, 2024, 8:57 p.m. | Abdul Issa

InfoSec Write-ups - Medium infosecwriteups.com

An Introduction to DNS Enumeration Tools and Techniques

DNS Enumeration

· Introduction
· DNS Enumeration Tools and Techniques
Nslookup
Host
Dig
Fierce
WHOIS
DNSEnum
Knockpy
Subfinder
Sublist3r
DNSRecon
Amass
Recon-NG
theHarvester
Nmap
Metasploit
· Conclusion
· Further Reading

Greetings, Cyber Mavericks!

This article is the first of a series of articles covering the use of DNS enumeration during the reconnaissance, exploitation, and post-exploitation phases …

amass article beginner cyber dig dns dnsrecon enumeration ethical hacking guide host introduction metasploit nmap penetration testing penetration testing tools recon reconnaissance s guide techniques tools whois

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Application Security Engineer - Enterprise Engineering

@ Meta | Bellevue, WA | Seattle, WA | New York City | Fremont, CA

Security Engineer

@ Retool | San Francisco, CA

Senior Product Security Analyst

@ Boeing | USA - Seattle, WA

Junior Governance, Risk and Compliance (GRC) and Operations Support Analyst

@ McKenzie Intelligence Services | United Kingdom - Remote

GRC Integrity Program Manager

@ Meta | Bellevue, WA | Menlo Park, CA | Washington, DC | New York City