DNSProbe is a tool built on top of retryabledns that allows you to perform multiple dns queries of your choice with a list of user supplied resolvers.
Usage
dnsprobe -h
Also Read – CrauEmu : uEmu Extension For Developing & Analyzing Payloads For Code-Reuse Attacks
This will display help for the tool. Here are all the switches it supports.
Flag | Description | Example |
---|---|---|
-c | Max dns retries (default 1) | dnsprobe -c 5 |
-l | List of dns domains (optional) | dnsprobe -l domains.txt |
-r | Request Type A, NS, CNAME, SOA, PTR, MX, TXT, AAAA (default “A”) | dnsprobe -r A |
-s | List of resolvers (optional) | dnsprobe -s resolvers.txt |
-t | Number of concurrent requests to make (default 250) | dnsprobe -t 500 |
-f | Output type: ip, domain, response, simple (domain + ip, default), full (domain + response), json (domain + raw response) | dnsprobe -f json |
-o | Output file (optional) | dnsprobe -o result.txt |
Installation Instructions
It requires go1.13+ to install successfully. Run the following command to get the repo –
GO111MODULE=on go get -u -v github.com/projectdiscovery/dnsprobe
In order to update the tool, you can use -u flag with go get command.
To query a list of domains, you can pass the list via stdin.
> cat domains.txt | dnsprobe
root@test:~# cat bc.txt | dnsprobe
bounce.bugcrowd.com 192.28.152.174
blog.bugcrowd.com 104.20.4.239
blog.bugcrowd.com 104.20.5.239
www.bugcrowd.com 104.20.5.239
www.bugcrowd.com 104.20.4.239
events.bugcrowd.com 54.84.134.174
> dnsprobe -l domains.txt -r CNAME
root@test:~# dnsprobe -l bc.txt -r CNAME
forum.bugcrowd.com bugcrowd.hosted-by-discourse.com. collateral.bugcrowd.com bugcrowd.outrch.com.
go.bugcrowd.com mkto-ab270028.com.
ww2.bugcrowd.com bugcrowdinc.mktoweb.com. researcherdocs.bugcrowd.com ssl.readmessl.com.
docs.bugcrowd.com ssl.readmessl.com.
This will run the tool against domains in domains.txt
and returns the results. The tool uses the resolvers specified with -s option to perform the queries or default system resolvers.
> subfinder -d bugcrowd.com -silent | dnsprobe -r cname
root@b0x:~# subfinder -d bugcrowd.com -silent | dnsprobe -r cname forum.bugcrowd.com bugcrowd.hosted-by-discourse.com. docs.bugcrowd.com ssl.readmessl.com.
go.bugcrowd.com mkto-ab270028.com.
ww2.bugcrowd.com bugcrowdinc.mktoweb.com. researcherdocs.bugcrowd.com ssl.readmessl.com.
collateral.bugcrowd.com bugcrowd.outrch.com.
proxilate.bugcrowd.com proxilate.a.bugcrowd.com.
shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…
Extract and execute a PE embedded within a PNG file using an LNK file. The…
Embark on the journey of becoming a certified Red Team professional with our definitive guide.…
This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…
This took me like 4 days (+2 days for an update), but I got it…
MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection. Its foundation is…