DNS analysis

By examining DNS records and certificates issued for a domain, we can passively learn about:

  • đŸ—ēī¸ Public domains and subdomains used by the company
  • 📮 Mail Server configuration through MX records
  • ✍ī¸ Externally connected apps through TXT records
  • 🧑 Targets for social engineering attacks
  • đŸ›Ŗī¸ Servers and IP ranges
  • ...

Inspect DNS Records

footprinting web_information_gathering passiverecon

You can examine DNS records using:

Inspect Registrar Information

footprinting web_information_gathering passiverecon

You can find social engineering information using:


Inspect IP Ranges

active_directory_enumeration_attacks

Find which IP ranges are owned by a company:


Certificate Transparency (CT)

footprinting web_information_gathering passiverecon subdomainenumeration

Another popular way to find subdomains is to study the generated certificate. A SSL certificate is generate for usually multiple domains, so we may find subdomains or other domains like this.


đŸ‘ģ To-do đŸ‘ģ

Stuff that I found, but never read/used yet.

  • knock (passive or brute force python tool)