dnsenum用法

root@root:/pentest/enumeration/dns/dnsenum# ./dnsenum.pl baidu.com
dnsenum.pl VERSION:1.2.2

-----   baidu.com   -----


Host's addresses:
__________________

baidu.com                                149      IN    A        220.181.111.85
baidu.com                                149      IN    A        220.181.111.86
baidu.com                                149      IN    A        123.125.114.144


Name Servers:
______________

ns4.baidu.com                            72162    IN    A        220.181.38.10
ns2.baidu.com                            73314    IN    A        61.135.165.235
dns.baidu.com                            72110    IN    A        202.108.22.220
ns3.baidu.com                            72256    IN    A        220.181.37.10


Mail (MX) Servers:
___________________

jpmx.baidu.com                           6270     IN    A        61.208.132.13
mx50.baidu.com                           292      IN    A        220.181.50.208
mx1.baidu.com                            300      IN    A        61.135.163.61


Trying Zone Transfers and getting Bind Versions:
_________________________________________________


Trying Zone Transfer for baidu.com on ns4.baidu.com ... 
AXFR record query failed: NOERROR

ns4.baidu.com Bind Version:     baidu dns

Trying Zone Transfer for baidu.com on ns2.baidu.com ... 
AXFR record query failed: NOERROR

ns2.baidu.com Bind Version:     baidu dns

Trying Zone Transfer for baidu.com on dns.baidu.com ... 
AXFR record query failed: NOERROR

dns.baidu.com Bind Version:     baidu dns

Trying Zone Transfer for baidu.com on ns3.baidu.com ... 
AXFR record query failed: NOERROR

ns3.baidu.com Bind Version:     baidu dns
 Wildcards detected, all subdomains will point to the same IP address, bye.
root@root:/pentest/enumeration/dns/dnsenum# 


上面的命令,得到了baidu.com的DNS信息。

还有一种用法是:

root@root:/pentest/enumeration/dns/dnsenum# ./dnsenum.pl -f dns.txt baidu.com

是暴力破解目标域中的子域,但是出来的结果,似乎没有区别。

你可能感兴趣的:(backtrack,网络,工具)