Unveiling the Secrets of Networks: DNS Network Mapper

RED TEAM | Malforge Group
5 min readJan 11, 2024

--

Hello everyone,

In today article we’re going to learn about a powerful DNS Network Mapper tool i.e, “dnsmap”.

dnsmap facilitates the discovery and mapping of DNS information, providing valuable insights into the structure and vulnerabilities of target domains.

That’s all you will see when execute it.

In this article, we will delve into the workings, functionalities, and purposes of dnsmap, shedding light on how this tool has become an integral component in the toolkit of cybersecurity experts and ethical hackers alike. Whether you’re a seasoned security professional or a curious enthusiast looking to understand the intricacies of DNS reconnaissance, this guide aims to demystify dnsmap and showcase its utility.

Before moving directly to the commands, let’s go through with some more deep detail knowledge with those topic’s i.e Understanding dnsmap, How dnsmap works, Practical Application’s and some red teaming activities.

1. Understanding dnsmap

What is dnsmap?

dnsmap is a command-line tool designed to explore and map the DNS infrastructure of a target domain. By utilizing a wordlist of potential subdomains, dnsmap systematically queries DNS servers to discover valid subdomains associated with the target domain. The tool employs various techniques, including brute force and dictionary attacks, to uncover hidden or overlooked subdomains that might pose security risks.

2. How dnsmap Works

Domain Enumeration

dnsmap operates by systematically querying DNS servers with a specified wordlist of subdomains. This process, known as domain enumeration, involves sending requests to DNS servers for various combinations of subdomains to identify active and reachable domains.

Brute Force and Dictionary Attacks

The tool employs brute force and dictionary attacks to exhaustively search for subdomains. Brute force involves attempting all possible combinations, while dictionary attacks use a predefined list of words as potential subdomains. dnsmap’s flexibility allows users to provide their custom wordlists, tailoring the search to the specific characteristics of the target domain.

3. Practical Applications

Security Auditing

Security professionals often use dnsmap to conduct security audits on their own domains or those of their clients. By identifying all accessible subdomains, security teams can proactively address potential security weaknesses and mitigate risks before malicious actors exploit them.

Penetration Testing

Ethical hackers and penetration testers leverage dnsmap to assess the attack surface of a target. The tool’s ability to unveil hidden subdomains aids in identifying potential entry points for attackers, allowing security measures to be strengthened accordingly.

Here are some red teaming activities where dnsmap can be a valuable asset

1. Subdomain Enumeration

  • Attack Type: Information Gathering
  • Purpose: dnsmap helps identify all possible subdomains associated with a target domain. This information is crucial for understanding the attack surface and potential entry points.

2. Brute Force and Dictionary Attacks

  • Attack Type: Credential Enumeration
  • Purpose: By using custom wordlists or dictionaries, dnsmap can attempt to discover subdomains that may be overlooked. This is particularly useful for finding hidden or less obvious entry points.

3. Social Engineering and Phishing:

  • Attack Type: Social Engineering
  • Purpose: The information gathered by dnsmap can be utilized in social engineering attacks. For example, phishing campaigns might leverage discovered subdomains to create convincing fake websites for harvesting credentials.

4. Infrastructure Mapping:

  • Attack Type: Reconnaissance
  • Purpose: Understanding the DNS infrastructure of a target organization is essential for mapping its digital footprint. dnsmap contributes to this by revealing subdomains and associated IP addresses.

5. Target Profiling:

  • Attack Type: Information Gathering
  • Purpose: dnsmap results can be used to build a profile of the target’s online presence. This information aids in tailoring subsequent attacks and identifying potential weak points in the target’s security.

Let’s Move to the Some Basic and Advanced Command’s

Note : Make sure to replace “example.com” with the target domain.

Here are some examples of how to use dnsmap:

1. Basic usage

dnsmap example.com

2. Using a custom wordlist and saving results to a specific file

dnsmap example.com -w yourwordlist.txt -r /tmp/domainbf_results.txt

3. Setting a delay between DNS requests

dnsmap example.com -r /tmp/ -d 3000

4. Using a Custom Resolver

dnsmap example.com --dns-server <custom-dns-server>

This option allows you to specify a custom DNS server to use for resolving domain names.

For example, if you have a DNS server running at IP address 192.168.1.1, your command would look like this

dnsmap example.com --dns-server 192.168.1.1  (EXAMPLE)

5. Specifying Multiple DNS Servers

dnsmap example.com --dns-servers <dns-server-1,dns-server-2,dns-server-3>

Use this option to provide a comma-separated list of DNS servers to be used in a round-robin fashion.

6. Brute-Force Mode

dnsmap example.com --bruteforce

Enable brute-force mode to exhaustively search for subdomains. This can be resource-intensive and time-consuming.

7. Using a Specific DNS Query Type

dnsmap example.com --query-type <dns-query-type>

Specify a specific DNS query type, such as A, AAAA, MX, TXT, etc., to focus the enumeration on a particular record type.

8. Ignoring Wildcard Subdomains

dnsmap example.com --ignore-wildcards

9. Verifying DNSSEC Signatures

dnsmap example.com --verify-dnssec

Enable DNSSEC verification to check the DNSSEC signatures for the resolved DNS records.

10. Outputting only IP Addresses

dnsmap example.com --only-ip

11. Brute-Force Mode with Wildcards

dnsmap example.com --bruteforce --wildcard-check

Combine brute-force mode with wildcard checking to discover subdomains that may not be explicitly listed.

12. Filtering by Response Code

dnsmap example.com --filter-response 200,301,302

Filter results based on HTTP response codes. This can help focus on subdomains that lead to actual web servers.

13. Subdomain Extraction from Web Pages

dnsmap example.com --web

Use the --web option to extract subdomains from web pages, potentially discovering hidden subdomains linked within the website.

14. Nmap with NSE Scripts

nmap --script dns-brute.nse -p 53 example.com

This command uses the dns-brute.nse script to perform DNS brute-force scanning on port 53 for the domain “example.com”.

15. Setting a Timeout for DNS Queries

dnsmap example.com --timeout <timeout-seconds>

Set a timeout for DNS queries. If a query takes longer than the specified timeout, it will be considered unsuccessful.

dnsmap stands as a versatile and valuable tool in the field of cybersecurity professionals, offering a robust solution for DNS reconnaissance and much more.

I hope you like this : )

RED TEAM-001

--

--

RED TEAM | Malforge Group
RED TEAM | Malforge Group

Written by RED TEAM | Malforge Group

I'm a 21-year-old malware developer with 1 year of experience. Passionate about learning new techniques, sharing knowledge, and creating malware tools.

No responses yet