Welcome!

By registering with us, you'll be able to discuss, share and private message with other members of our community.

SignUp Now!
adv ex on 5 january 2024
adv ex on 22 February 2024
BidenCash Shop
Kfc Club

Patrick Stash
banner Expire 26 October 2024
Rescator cvv and dump shop
Ad Ends 6 november 2022
Yale lodge shop
UniCvv
banner Expire 1 April  2021

Premiums

TRUSTED VENDOR
Joined
Dec 5, 2020
Messages
2,117





By default any user in Active Directory can enumerate all DNS records in the Domain or Forest DNS zones, similar to a zone transfer. This tool enablesenumeration and exporting of all DNS records in the zone for recon purposes of internal networks.
For more info, read the associated blog post.

Install and usage

You can either install the tool via pip with pip install adidnsdump or install it from git to have the latest version:
Code:
git clone https://github.com/dirkjanm/adidnsdump
cd adidnsdump
pip install
or
Code:
pip install git+https://github.com/dirkjanm/adidnsdump#egg=adidnsdump
https://github.com/dirkjanm/adidnsdump#egg=adidnsdump
The tool requires impacket and dnspython to function. While the tool works with both Python 2 and 3, Python 3 support requires you to install impacket from GitHub.
Installation adds the adidnsdump command to your PATH. For help, try adidnsdump -h. The tool can be used both directly from the network and via an implant using proxychains. If using proxychains, make sure to specify the --dns-tcp option.

Download Adidnsdump
 
Top Bottom