root@root:/pentest/enumeration/dns/dnsenum# ./dnsenum.pl baidu.com
dnsenum.pl VERSION:1.2.2
----- baidu.com -----
Host's addresses:
__________________
baidu.com 149 IN A 220.181.111.85
baidu.com 149 IN A 220.181.111.86
baidu.com 149 IN A 123.125.114.144
Name Servers:
______________
ns4.baidu.com 72162 IN A 220.181.38.10
ns2.baidu.com 73314 IN A 61.135.165.235
dns.baidu.com 72110 IN A 202.108.22.220
ns3.baidu.com 72256 IN A 220.181.37.10
Mail (MX) Servers:
___________________
jpmx.baidu.com 6270 IN A 61.208.132.13
mx50.baidu.com 292 IN A 220.181.50.208
mx1.baidu.com 300 IN A 61.135.163.61
Trying Zone Transfers and getting Bind Versions:
_________________________________________________
Trying Zone Transfer for baidu.com on ns4.baidu.com ...
AXFR record query failed: NOERROR
ns4.baidu.com Bind Version: baidu dns
Trying Zone Transfer for baidu.com on ns2.baidu.com ...
AXFR record query failed: NOERROR
ns2.baidu.com Bind Version: baidu dns
Trying Zone Transfer for baidu.com on dns.baidu.com ...
AXFR record query failed: NOERROR
dns.baidu.com Bind Version: baidu dns
Trying Zone Transfer for baidu.com on ns3.baidu.com ...
AXFR record query failed: NOERROR
ns3.baidu.com Bind Version: baidu dns
Wildcards detected, all subdomains will point to the same IP address, bye.
root@root:/pentest/enumeration/dns/dnsenum#
上面的命令,得到了baidu.com的DNS信息。
还有一种用法是:
root@root:/pentest/enumeration/dns/dnsenum# ./dnsenum.pl -f dns.txt baidu.com
是暴力破解目标域中的子域,但是出来的结果,似乎没有区别。