Post

DNS Enumeration

DNS Enumeration

Dig For Pentesting

1
dig AXFR bestfestivalcompany.thm @10.10.13.46

What This Command Does

  • dig: DNS lookup utility used for querying Domain Name System servers.

  • AXFR: Stands for Authoritative Zone Transfer, a DNS operation intended to replicate an entire DNS zone file from a server.

  • bestfestivalcompany.thm: The domain to perform the zone transfer against.

  • @10.10.13.46: Specifies the DNS server to query directly, in this case, IP 10.10.13.46.

Purpose

This command attempts to retrieve all DNS records for the domain bestfestivalcompany.thm by requesting a zone transfer. Zone transfers are typically restricted to authorized servers (secondary DNS servers), but misconfigured DNS servers may allow unauthorized transfers, exposing:

  • Subdomains

  • Internal infrastructure details

  • Service records

  • Hostnames

  • Additional metadata

This is often leveraged during reconnaissance phases of Red Team assessments or CTFs to map a target’s internal network.


Example Output (Expected if Vulnerable)

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
; <<>> DiG 9.20.9-1-Debian <<>> AXFR bestfestivalcompany.thm @10.10.13.46
;; global options: +cmd
bestfestivalcompany.thm. 600    IN      SOA     bestfestivalcompany.thm. hostmaster.bestfestivalcompany.thm. 1751409901 1200 180 1209600 600
bestfestivalcompany.thm. 600    IN      NS      bestfestivalcompany.thm.
bestfestivalcompany.thm. 600    IN      NS      0.0.0.0/0.
thehub-uat.bestfestivalcompany.thm. 600 IN A    172.16.1.3
thehub-int.bestfestivalcompany.thm. 600 IN A    172.16.1.3
thehub.bestfestivalcompany.thm. 600 IN  A       172.16.1.3
adm-int.bestfestivalcompany.thm. 600 IN A       172.16.1.2
npm-registry.bestfestivalcompany.thm. 600 IN A  172.16.1.2
bestfestivalcompany.thm. 600    IN      SOA     bestfestivalcompany.thm. hostmaster.bestfestivalcompany.thm. 1751409901 1200 180 1209600 600
;; Query time: 58 msec
;; SERVER: 10.10.13.46#53(10.10.13.46) (TCP)
;; WHEN: Tue Jul 01 18:48:35 EDT 2025
;; XFR size: 9 records (messages 1, bytes 451)

Such output exposes all known records, significantly aiding network mapping and attack surface identification.


Available Additional Arguments for dig

ArgumentDescription
@<server>Query a specific DNS server
<record type>Request specific record types (e.g., A, MX, TXT, NS)
+shortProvides concise output
+traceTraces the DNS resolution path step-by-step
+nocmdSuppresses the command display in output
ANYQueries all record types for a domain (if permitted)
-x <IP>Performs reverse DNS lookup
+norecursePrevents recursion in DNS queries
-t <record type>Explicitly specify record type (alternative to direct input)

Example Variants

  • Query a different record:

    1
    
      dig A www.bestfestivalcompany.thm @10.10.13.46
    
  • Reverse DNS lookup:

    1
    
      dig -x 10.10.13.50 @10.10.13.46
    
  • Tracing DNS resolution:

    1
    
      dig +trace bestfestivalcompany.thm
    

Summary

This command attempts a DNS Zone Transfer, a high-value reconnaissance action if the DNS server is improperly configured. Misconfigured AXFR permissions expose complete DNS infrastructure, commonly leading to identification of hidden hosts or services exploitable during further penetration testing activities.




This post is licensed under CC BY 4.0 by the author.