Lab Manual Gathering Domain Info Using DNSENUM
Lab Manual Gathering Domain Info Using DNSENUM
ENUMERATION TOOL
WHAT IS ENUMERATION
Enumeration is the process of obtaining information from a system, such as
user identities, machine names, network resources, shares, and services. The
attacker establishes an active connection to the system at this point and
launches directed queries to learn more about the target. The information
acquired is then utilized to pinpoint any weaknesses in system security that
can be exploited during the system acquiring phase.
Enumeration is also called as Information Gathering Phase which is the first
phase where hackers try to gather information and try to establish an active
connection with the devices or systems. Attackers often evaluate attack
vectors by using the output of the enumeration to exploit the system further.
Additionally, malicious actors utilize penetration testing tools to gather data
on network services and shares, IP routing tables, hostnames, DNS details,
SNMP information, and users on database records.
To collect usernames, hostnames, IP addresses, passwords, configurations,
and other information, enumeration is used. Hackers control the objective
framework once a working connection has been established with the
objective host. At that time, they steal personal information and data.
Additionally, aggressors have occasionally been found to modify how the
objective frameworks are set up. The information or data that the attacker
will have access to depends on how the connection is set up to the host.
WHAT IS DNS ENUMERATION ?
Finding every DNS server and its accompanying entries for an organization
is known as DNS enumeration. A map or an address book is analogous to
DNS.
ADVANTAGES OF ENUMERATION
• Enumeration is important because it methodically gathers
information.
• This makes it possible for pentesters to fully inspect the system.
• In the enumeration stage of ethical hacking the pentesters gather
data regarding the weak links.
DISADVANTAGES OF ENUMERATION
• They are typically simple to find and simple to take advantage of.
• They are hazardous because they frequently make it possible for
attackers to fully control the software and steal the data.
In this Exercise, We will gather as much as possible about domain using
DNSenum Tool.
DNSenum
Dnsenum is a multithreaded perl script to enumerate DNS information of a
domain and to discover non-contiguous ip blocks. The main purpose of
Dnsenum is to gather as much information as possible about a domain. The
program currently performs the following operations:
This program is useful for pen testers, ethical hackers and forensics
experts. It can also be used for security tests.
Guided Exercise
Step to Perform this Exercise
1. Connect to the kali Linux machine, created by you, using the RDP
protocol. Kali Linux machine is being used as Attacker’s machine.
2. When prompted for the username and password, enter root as
username and toor as password. The root is the administrator user of
the machine.
root
toor
Log In
Once you successfully login in, you will see a screen like this. Here you can see
one folder named as DNSenum, double click on the folder to open it
3. Now Right Click on the folder DNSenum and choose the option of
Open Terminal Here