• port: 53 (TCP/UDP)
  • resolves hostnames to their respective IPs
  • UDP us typically used for queries because of lower overhead while tcp is used for larger/zone transfers

checklist:

  • Zone Transfer (AXFR)
    • Try dig axfr @target domain.com or dnsrecon -t axfr
    • If it works, you get the whole internal map—juicy AF
  • Subdomain Enumeration
  • Cache Poisoning
    • Try injecting fake DNS responses if resolver is vulnerable
    • Rare now, but works if DNS lacks 0x20 randomization or source port entropy
  • DNS Rebinding
    • Target browsers behind firewalls
    • Host a malicious domain that resolves to internal IPs after initial auth
  • DNSSEC Misconfig
    • Look for unsigned zones or broken chains
    • If DNSSEC is partially deployed, it can leak info or cause denial
  • Internal Domain Leakage
    • Use dig +trace or passive DNS to uncover internal domains like corp.local
    • Great recon target for phishing or VPN access
  • Wildcard DNS Abuse
    • Some domains resolve anything (.domain.com)
    • Can be used for cookie theft, cache poisoning, or spoofing
  • Name Server Enumeration
    • Use dig NS domain.com, then brute subdomains per name server
    • Often uncovers legacy systems
  • UDP Amplification
    • Use small spoofed queries to trigger large responses → DDoS vector
    • Check for open resolvers with dns-any queries
  • Split Horizon Leaks
    • Internal-only zones sometimes leak due to misconfig (esp. via VPN DNS leaks)
    • Compare external vs internal results for same domain
  • Record Misconfigs
    • Missing or loose SPF, DKIM, DMARC = email spoofing
    • PTR records mismatched = flag on phishing setups
  • Brute-Force Zone Records
    • Use dnsenum, fierce, or massdns to guess A, CNAME, MX records
    • Catch unlinked apps, dev tools, or staging APIs