DNSrr – Tool to Enumerate Juicy Information from DNS
DNS enumeration is the process of locating all the DNS servers and their corresponding records for an organization. In some cases, Penetration Tester or Bug Bounty Hunter cannot bypass actual DNS addresses. It is mask under the CDN (Content Delivery Network) like Cloudflare, Google CDN, StackPath, etc. So to get the crucial information for DNS, an automated script is designed in the Bash Language named DNSrr. DNSrr tool performs various operations like forwarding DNS Lookup Bruteforce, Reverse DNS Lookup BruteForce, etc. DNS Enumeration can reveal the size of the enterprise of the target organization which can translate to the potential size of the attack surface.
Features of DNSrr Tool
- DNSrr tool is open-source and free to use.
- DNSrr tool supports DNS Forward Bruteforce, DNS Reverse Bruteforce, DNS Cache Snooping, DNS Zone Transfer.
- DNSrr tool has the feature to explain the usage of each option of the tool.
- DNSrr tool is designed in the bash language.
- DNSrr tool is straightforward to use.
Installation of DNSrr Tool on Kali Linux OS
Step 1: Open up your Kali Linux terminal and move to Desktop using the following command.
Step 2: You are on Desktop now create a new directory called DNSrr using the following command. In this directory, we will complete the installation of the DNSrr tool.
Step 3: Now switch to the DNSrr directory using the following command.
Step 4: Now you have to install the tool. You have to clone the tool from Github.
git clone https://github.com/A3h1nt/Dnsrr
Step 5: The tool has been downloaded successfully in the DNSrr directory. Now list out the contents of the tool by using the below command.
Step 6: You can observe that there is a new directory created of the DNSrr tool that has been generated while we were installing the tool. Now move to that directory using the below command:
Step 7: Once again to discover the contents of the tool, use the below command.
Step 8: Run the Bash Script using the following command.
Working with DNSrr Tool on Kali Linux OS
Example 1: Zone Transfer
1. In this example, We will be performing Zone Transfer on the target domain geeksforgeeks.org. We have provided the zone detail and the domain detail using the -z tag.
./dnsrr.sh -z ns-1520.awsdns-62.org geeksforgeeks.org
2. In this example, We will be performing Zone Transfer on the target domain zonetransfer.me. We have provided the zone detail and the domain detail using the -z tag.
./dnsrr.sh -z nsztm1.digi.ninja zonetransfer.me
Example 2: Forward Lookup Brute Force
1. In this Example, We are performing Forward Lookup Brute Force on the target domain geeksforgeeks.org. We have used -fb flag along with the domain.
./dnsrr.sh -fb geeksforgeeks.org
Example 3: Reverse Lookup Brute Force
1. In this Example, We are performing Reverse Lookup Brute Force on the target domain geeksforgeeks.org. We have used -rb tag along with the domain.
./dnsrr.sh -rb geeksforgeeks.org
Example 4: Explain a Particular Option
1. In this Example, We are listing the detailed information about the various options offered by this tool. -x tag is used along with the option.
./dnsrr.sh -x rb
2. In the below Screenshot, We are listing the detailed information about the Reverse DNS Lookup Brute Force.