quay.io/trickest/dnsrecon:e1b742e
Parameters
-a
Perform AXFR with standard enumeration.-d
Target domain-f
Filter out of brute force domain lookup, records that resolve to the wildcard defined IP address when saving records.--threads
Number of threads to use in reverse lookups, forward lookups, brute force and SRV record enumeration.--lifetime
Time to wait for a server to respond to a query. Default is 3.--tcp
Use TCP protocol to make queries.-r
IP range for reverse lookup brute force in formats (first-last) or in (range/bitmask).-n
Domain server to use. If none is given, the SOA of the target will be used. Multiple servers can be using a comma separated list.-v
Enable verbose.-w
Perform deep whois record analysis and reverse lookup of IP ranges found through Whois when doing a standard enumeration.-k
Perform crt.sh enumeration with standard enumeration.-D
Dictionary file of subdomain and hostnames to use for brute force. Filter out of brute force domain lookup, records that resolve to the wildcard defined IP address when saving records.-b
Perform Bing enumeration with standard enumeration.-z
Performs a DNSSEC zone walk with standard enumeration.-t
Type of enumeration to perform. Possible types: std, rvl, srv, axfr, bing, yand, snoop, tld, and zonewalk-y
Perform Yandex enumeration with standard enumeration.-s
Perform a reverse lookup of IPv4 ranges in the SPF record with standard enumeration.--iw
Continue brute forcing a domain even if a wildcard record is discovered.--disable-check-recursion
Disables check for recursion on name servers.--disable-check-bindversion
Disables check for BIND version on name servers.