DNSx - A Fast And Multi-Purpose DNS Toolkit Allow To Run Multiple DNS Queries Of Your Choice With A List Of User-Supplied Resolvers
2020-11-28 05:30:00 Author: www.blogger.com(查看原文) 阅读量:173 收藏

tag:blogger.com,1999:blog-8317222231133660547.post-38965841651050588642020-11-27T17:30:00.001-03:002020-11-27T17:30:01.359-03:00DNSx - A Fast And Multi-Purpose DNS Toolkit Allow To Run Multiple DNS Queries Of Your Choice With A List Of User-Supplied Resolvers<div class="separator" style="clear: both; text-align: center;"><a href="https://1.bp.blogspot.com/-ska1w3EhqF4/X8Dc4q8NmkI/AAAAAAAAUe8/5NAkpTLayJg44rUxxukF2yob452wZs7NACNcBGAsYHQ/s1750/dnsx_8_dnsx-run.png" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="1200" data-original-width="1750" height="438" src="https://1.bp.blogspot.com/-ska1w3EhqF4/X8Dc4q8NmkI/AAAAAAAAUe8/5NAkpTLayJg44rUxxukF2yob452wZs7NACNcBGAsYHQ/w640-h438/dnsx_8_dnsx-run.png" width="640" /></a></div><p><br /></p><p><strong>dnsx</strong> is a fast and multi-purpose DNS <a href="https://www.kitploit.com/search/label/Toolkit" target="_blank" title="toolkit">toolkit</a> allow to run multiple probers using <a href="https://github.com/projectdiscovery/retryabledns" rel="nofollow" target="_blank" title="retryabledns">retryabledns</a> library, that allows you to perform multiple DNS queries of your choice with a list of user supplied resolvers.</p> <p>dnsx is successor of <a href="https://github.com/projectdiscovery/dnsprobe" rel="nofollow" target="_blank" title="dnsprobe">dnsprobe</a> that includes new features, multiple bugs fixes, and tailored for better user experience, few notable flags are <code>resp</code> and <code>resp-only</code> that allows to control and print the exact information you are looking for.</p> <p>We also ported DNS wildcard filtering feature to dnsx from <a href="https://github.com/projectdiscovery/shuffledns" rel="nofollow" target="_blank" title="shuffledns">shuffledns</a> as a standalone support.</p> <span><a name='more'></a></span><div><br /></div><span style="font-size: x-large;"><b>Features</b></span><br /> &nbsp;<br /> <ul> <li>Simple and Handy utility to query DNS records.</li> <li>Supports <strong>A, AAAA, CNAME, PTR, NS, MX, TXT, SOA</strong></li> <li>Handles wildcard subdomains in <a href="https://www.kitploit.com/search/label/Automated" target="_blank" title="automated">automated</a> way.</li> <li>Optimized for <strong>ease of use</strong>.</li> <li><strong>Stdin</strong> and <strong>stdout</strong> support to work with other tools.</li> </ul> <br /><span style="font-size: x-large;"><b>Usage</b></span><br /> <div><pre><code>dnsx -h</code></pre></div> <p>This will display help for the tool. Here are all the switches it supports.</p> <table> <tbody><tr> <th>Flag</th> <th>Description</th> <th>Example</th> </tr> <tr> <td>a</td> <td>Query A record</td> <td>dnsx -a</td> </tr> <tr> <td>aaaa</td> <td>Query AAAA record</td> <td>dnsx -aaaa</td> </tr> <tr> <td>cname</td> <td>Query CNAME record</td> <td>dnsx -cname</td> </tr> <tr> <td>ns</td> <td>Query NS record</td> <td>dnsx -ns</td> </tr> <tr> <td>ptr</td> <td>Query PTR record</td> <td>dnsx -ptr</td> </tr> <tr> <td>txt</td> <td>Query TXT record</td> <td>dnsx -txt</td> </tr> <tr> <td>mx</td> <td>Query MX record</td> <td>dnsx -mx</td> </tr> <tr> <td>soa</td> <td>Query SOA record</td> <td>dnsx -soa</td> </tr> <tr> <td>raw</td> <td>Operates like dig</td> <td>dnsx -raw</td> </tr> <tr> <td>l</td> <td>File input list of subdomains/host</td> <td>dnsx -l list.txt</td> </tr> <tr> <td>json</td> <td>JSON output</td> <td>dnsx -json</td> </tr> <tr> <td>r</td> <td>File or comma separated resolvers</td> <td>dnsx -r 1.1.1.1</td> </tr> <tr> <td>rl</td> <td>Limit of DNS request/second</td> <td>dnsx -rl 100</td> </tr> <tr> <td>resp</td> <td>Display response data</td> <td>dnsx -cname -resp</td> </tr> <tr> <td>resp-only</td> <td>Display only response data</td> <td>dnsx -cname resp-only</td> </tr> <tr> <td>retry</td> <td>Number of DNS retries</td> <td>dnsx -retry 1</td> </tr> <tr> <td>silent</td> <td>Show only results in the output</td> <td>dnsx -silent</td> </tr> <tr> <td>o</td> <td>File to write output to (optional)</td> <td>dnsx -o output.txt</td> </tr> <tr> <td>t</td> <td>Concurrent threads to make</td> <td>dnsx -t 250</td> </tr> <tr> <td>verbose</td> <td>Verbose output</td> <td>dnsx -verbose</td> </tr> <tr> <td>version</td> <td>Show version of dnsx</td> <td>dnsx -version</td> </tr> <tr> <td>wd</td> <td>Wildcard domain name for filtering</td> <td>dnsx -wd example.com</td> </tr> <tr> <td>wt</td> <td>Wildcard Filter Threshold</td> <td>dnsx -wt 5</td> </tr> </tbody></table> <br /><span style="font-size: x-large;"><b>Installation Instructions</b></span><br /> <br /><span style="font-size: large;"><b>From Source</b></span><br /> <p>The installation is easy. You can download the pre-built binaries for your platform from the <a href="https://github.com/projectdiscovery/dnsx/releases/" rel="nofollow" target="_blank" title="Releases">Releases</a> page. Extract them using tar, move it to your <code>$PATH</code>and you're ready to go.</p> <div><pre><code>Download latest <a href="https://www.kitploit.com/search/label/Binary" target="_blank" title="binary">binary</a> from https://github.com/projectdiscovery/dnsx/releases<br /><br />▶ tar -xvf dnsx-linux-amd64.tar<br />▶ mv dnsx-linux-amd64 /usr/local/bin/dnsx<br />▶ dnsx -h</code></pre></div> <br /><span style="font-size: large;"><b>From Source</b></span><br /> <p><strong>dnsx</strong> requires <strong>go1.14+</strong> to install successfully. Run the following command to get the repo -</p> <div><pre><code>▶ GO111MODULE=on go get -u -v github.com/projectdiscovery/dnsx/cmd/dnsx</code></pre></div> <br /><span style="font-size: large;"><b>From Github</b></span><br /> <div><pre><code>▶ git clone https://github.com/projectdiscovery/dnsx.git; cd dnsx/cmd/dnsx; go build; mv dnsx /usr/local/bin/; dnsx -version</code></pre></div> <br /><span style="font-size: large;"><b>Running dnsx</b></span><br /> <p><strong>dnsx</strong> can be used to filter dead records from the list of passive subdomains obtained from various sources, for example:-</p> <div><pre><code>▶ <a href="https://www.kitploit.com/search/label/Subfinder" target="_blank" title="subfinder">subfinder</a> -silent -d hackerone.com | dnsx<br /><br /> _ __ __<br /> __| | _ __ ___ \ \/ /<br /> / _' || '_ \ / __| \ / <br /> | (_| || | | |\__ \ / \<br /> \__,_||_| |_||___//_/\_\ v1.0<br /><br /> projectdiscovery.io<br /><br />[WRN] Use with caution. You are responsible for your actions<br />[WRN] Developers assume no liability and are not responsible for any misuse or damage.<br /><br />a.ns.hackerone.com<br />www.hackerone.com<br />api.hackerone.com<br />docs.hackerone.com<br />mta-sts.managed.hackerone.com<br />mta-sts.hackerone.com<br />resources.hackerone.com<br />b.ns.hackerone.com<br />mta-sts.forwarding.hackerone.com<br />events.hackerone.com<br />support.hackerone.com</code></pre></div> <p><strong>dnsx</strong> can be used to extract <strong>A</strong> records for the given list of subdomains, for example:-</p> <div><pre><code>▶ subfinder -silent -d hackerone.com | dnsx -silent -A -resp<br /><br />a.ns.hackerone.com [162.159.0.31]<br />b.ns.hackerone.com [162.159.1.31]<br />mta-sts.hackerone.com [185.199.108.153]<br />events.hackerone.com [208.100.11.134]<br />mta-sts.managed.hackerone.com [185.199.108.153]<br />resources.hackerone.com [52.60.160.16]<br />resources.hackerone.com [52.60.165.183]<br />www.hackerone.com [104.16.100.52]<br />support.hackerone.com [104.16.53.111]</code></pre></div> <p><strong>dnsx</strong> can be used to extract <strong>CNAME</strong> records for the given list of subdomains, for example:-</p> <div><pre><code>▶ subfinder -silent -d hackerone.com | dnsx -silent -cname -resp<br /><br />support.hackerone.com [hackerone.zendesk.com]<br />resources.hackerone.com [read.uberflip.com]<br />mta-sts.hackerone.com [hacker0x01.github.io]<br />mta-sts.forwarding.hackerone.com [hacker0x01.github.io]<br />events.hackerone.com [whitelabel.bigmarker.com]</code></pre></div> <p><strong>dnsx</strong> can be used to extract subdomains from given network range using <code>PTR</code> query, for example:-</p> <div><pre><code>mapcidr -cidr 173.0.84.0/24 -silent | dnsx -silent -resp-only -ptr<br /><br />cors.api.paypal.com<br />trinityadminauth.paypal.com<br />cld-edge-origin-api.paypal.com<br />appmanagement.paypal.com<br />svcs.paypal.com<br />trinitypie-serv.paypal.com<br />ppn.paypal.com<br />pointofsale-new.paypal.com<br />pointofsale.paypal.com<br />slc-a-origin-pointofsale.paypal.com<br />fpdbs.paypal.com</code></pre></div> <br /><span style="font-size: large;"><b>Wildcard filtering</b></span><br /> <p>A special feature of <strong>dnsx</strong> is its ability to handle <strong>multi-level DNS based wildcards</strong> and do it so with very less number of DNS requests. Sometimes all the subdomains will resolve which will lead to lots of garbage in the results. The way <strong>dnsx</strong> handles this is it will keep track of how many subdomains point to an IP and if the count of the <a href="https://www.kitploit.com/search/label/Subdomains" target="_blank" title="Subdomains">Subdomains</a> increase beyond a certain small threshold, it will check for wildcard on all the levels of the hosts for that IP iteratively.</p> <div><pre><code>dnsx -l airbnb-subs.txt -wd airbnb.com -o output.txt</code></pre></div> <br /><span style="font-size: x-large;"><b><div><b>Notes</b></div></b></span> <ul> <li>As default, <strong>dnsx</strong> checks for <strong>A</strong> record.</li> <li>As default dnsx uses Google, Cloudflare, Quad9 <a href="https://github.com/projectdiscovery/dnsx/blob/43af78839e237ea8cbafe571df1ab0d6cbe7f445/libs/dnsx/dnsx.go#L31" rel="nofollow" target="_blank" title="resolver">resolver</a>.</li> <li>Domain name input is mandatory for wildcard elimination.</li> <li>DNS record flag can not be used when using wildcard filtering.</li> </ul> <p>dnsx is made with </p><div></div> by the <a href="https://projectdiscovery.io" rel="nofollow" target="_blank" title="projectdiscovery">projectdiscovery</a> team. <br /><br /><div style="text-align: center;"><b><span style="font-size: x-large;"><a class="kiploit-download" href="https://github.com/projectdiscovery/dnsx" rel="nofollow" target="_blank" title="Download Dnsx">Download Dnsx</a></span></b></div>Zion3R[email protected]

文章来源: http://www.blogger.com/feeds/8317222231133660547/posts/default/3896584165105058864
如有侵权请联系:admin#unsafe.sh