2017-07-13 11:00:21 +02:00
|
|
|
dnsmap was originally released back in 2006 and
|
|
|
|
was inspired by the fictional story "The Thief
|
|
|
|
No One Saw" by Paul Craig, which can be found
|
2017-01-06 20:56:11 +01:00
|
|
|
in the book "Stealing the Network - How to 0wn the Box".
|
|
|
|
|
2017-07-13 11:00:21 +02:00
|
|
|
dnsmap is mainly meant to be used by pentesters
|
|
|
|
during the information gathering/enumeration phase
|
|
|
|
of infrastructure security assessments. During the
|
|
|
|
enumeration stage, the security consultant would
|
2017-01-06 20:56:11 +01:00
|
|
|
typically discover the target company's IP netblocks,
|
|
|
|
domain names, phone numbers, etc ...
|
|
|
|
|
2017-07-13 11:00:21 +02:00
|
|
|
Subdomain brute-forcing is another technique that
|
|
|
|
should be used in the enumeration stage, as it's
|
|
|
|
especially useful when other domain enumeration
|
2017-01-06 20:56:11 +01:00
|
|
|
techniques such as zone transfers don't work.
|
|
|
|
|
2017-07-13 11:00:21 +02:00
|
|
|
WWW: https://tools.kali.org/information-gathering/dnsmap
|