Kang Asu
Adidnsdump - Active Directory Integrated DNS Dumping By Any Authenticated User
By default any user in Active Directory can enumerate all DNS records in the Domain or Forest DNS zones, similar to a zone transfer. This tool enables enumeration and exporting of all DNS records in the zone for recon purposes of internal networks.
For more info, read the associated blog post.
Install and usage
You can either install the tool via pip with
pip install adidnsdump
or install it from git to have the latest version:git clone https://github.com/dirkjanm/adidnsdump
cd adidnsdump
pip install .
or
pip install git+https://github.com/dirkjanm/adidnsdump#egg=adidnsdump
The tool requires
Installation adds the
impacket
and dnspython
to function. While the tool works with both Python 2 and 3, Python 3 support requires you to install impacket from GitHub.Installation adds the
adidnsdump
command to your PATH
. For help, try adidnsdump -h
. The tool can be used both directly from the network and via an implant using proxychains. If using proxychains, make sure to specify the --dns-tcp
option.
Regards
Kang Asu
No comments:
Post a Comment
# Silahkan berkomentar, bertanya dan kritik dengan sopan
# Disini anda boleh menyisipkan Link di kolom komentar
# Tetapi akan saya moderasi atau Review terlebih dahulu tiap komentar
# Jangan sampai komentar anda mengandung SPAM.
# Terima Kasih - Regards Muhammad Sobri Maulana