Cyber Pulse Academy

Latest News
A 142.250.80.46 AAAA 2606:4700::6810 MX 10 mail.google.com NS ns1.example.com TXT v=spf1 include: CNAME www → cdn.cloudflare.com SOA ns1.dns.provider.net PTR 46.80.250.142.in-addr.arpa
MITRE ATT&CK · T1590.002

DNS Enumeration
& Infrastructure Mapping

How adversaries map your Domain Name System to uncover infrastructure, services, and vulnerabilities before launching their attack.

Tactic: Reconnaissance Sub-technique of T1590 Platform: Windows, Linux, macOS Severity: High
CSS-Only Simulation

DNS Query Lifecycle Visualization

When you type a domain name into your browser, a complex chain of DNS lookups occurs in milliseconds. This CSS animation demonstrates how a single query travels through the global DNS hierarchy , from your local resolver, up through root and TLD servers, down to the authoritative nameserver that holds the final answer. Each hop reveals progressively more detail about the target's infrastructure.

💻 Client Your Browser
🔄 Recursive Resolver (ISP)
🌍 Root Server a.root-servers.net
📍 TLD Server .com NS
🖥️ Authoritative NS1.target.com

DNS Record Types Discovered

Each DNS record type reveals different information about a target's infrastructure. Adversaries systematically query all record types to build a comprehensive map of servers, services, and network topology that defenders may not realize is publicly accessible through simple DNS queries.

A
IPv4 address mapping , reveals web server and service IPs
AAAA
IPv6 address mapping , dual-stack infrastructure details
MX
Mail exchange , identifies email providers and mail gateway IPs
NS
Nameserver , reveals DNS hosting provider and zone management
TXT
Text records , SPF, DKIM, verification tokens, internal info leaks
CNAME
Alias , maps to cloud providers (S3, CloudFront, Azure CDN)
SOA
Start of Authority , admin email, serial numbers, refresh intervals
PTR
Reverse DNS , maps IP addresses back to domain names for host discovery

Subdomain Enumeration in Progress

Attackers use wordlists and brute-force techniques to discover subdomains that organizations may have forgotten about. Each discovered subdomain represents a potential entry point , staging servers, testing APIs, internal tools accidentally exposed to the internet, or deprecated services that never got properly decommissioned.

[FOUND] mail.target-corp.com → 203.0.113.10
[FOUND] vpn.target-corp.com → 203.0.113.20
[FOUND] admin.target-corp.com → 203.0.113.30
[FOUND] api.target-corp.com → 203.0.113.40
[SCAN] dev.target-corp.com → 203.0.113.55
[SCAN] staging.target-corp.com → 203.0.113.60
[SCAN] internal.target-corp.com → 203.0.113.70

DNS Zone Contents Revealed

A successful zone transfer (AXFR) gives attackers the complete DNS configuration in a single request. This includes every record, every subdomain, every timestamp, and every responsible administrator email. Zone transfers should never be allowed to untrusted IPs, yet many organizations leave this critical vulnerability wide open.

$ORIGIN target-corp.com.
$TTL 3600
@ IN SOA ns1.target-corp.com. admin.target-corp.com. (2025011501 7200 3600 1209600 86400)
@ IN A 203.0.113.5
@ IN MX 10 mail.target-corp.com.
@ IN NS ns1.target-corp.com.
@ IN NS ns2.target-corp.com.
@ IN TXT "v=spf1 ip4:203.0.113.0/24 -all"
www IN CNAME cdn.cloudflare.com.
api IN A 203.0.113.40
dev IN A 203.0.113.55
staging IN A 203.0.113.60
internal IN A 10.0.1.10

DNS Cache Poisoning Visualization

DNS cache poisoning is one of the most dangerous attacks against the DNS infrastructure. By injecting forged DNS responses into a resolver's cache, attackers can redirect legitimate traffic to malicious servers without the victim ever knowing. The poisoned cache serves malicious IP addresses to every user who queries the compromised domain until the cache entry expires.

DNS Cache Poisoning Attack
● Clean Cache
banking.example.com203.0.113.100
mail.example.com203.0.113.101
api.example.com203.0.113.102
vpn.example.com203.0.113.103
● Poisoned Cache
banking.example.com203.0.113.100 104.21.X.X (ATTACKER)
mail.example.com203.0.113.101 104.21.X.X (ATTACKER)
api.example.com203.0.113.102 104.21.X.X (ATTACKER)
vpn.example.com203.0.113.103 104.21.X.X (ATTACKER)
Threat Landscape

Why DNS Reconnaissance Matters

CVSS 8.6
CVE-2025-40778 BIND9 flaw enables DNS cache poisoning, putting 5,900+ DNS servers at risk of complete compromise
The Hacker News, 2025
358%
Surge in DDoS attacks in Q1 2025, with many leveraging DNS amplification vectors using misconfigured resolvers
Cloudflare / DeepStrike, 2025
31.4 Tbps
Record-breaking DDoS attack in November 2025, demonstrating the devastating scale of DNS-based amplification
Security Affairs, 2025
5,900+
DNS servers vulnerable to a single BIND9 flaw, highlighting the systemic risk of DNS infrastructure weaknesses
The Hacker News, 2025
Top Vector
DNS amplification DDoS remains one of the most effective attack methods due to open DNS resolvers worldwide
StormWall / CISA
CISA Warns
DNS infrastructure is identified as a common threat vector across multiple nation-state and criminal attack campaigns
CISA Advisory AA19-024A

DNS is the backbone of internet routing , every connection, every service, every communication begins with a DNS lookup. When adversaries perform DNS reconnaissance (T1590.002), they gain an extraordinary amount of information about your organization without sending a single packet to your servers. They learn your infrastructure topology, cloud service providers, email gateways, security configurations, and even internal naming conventions that reveal organizational structure. DNS is the internet's phone book, and attackers are methodically copying every page.


The consequences of poor DNS security extend far beyond information disclosure. DNS cache poisoning can redirect thousands of users to phishing sites. DNS amplification attacks can generate devastating DDoS floods. Misconfigured zone transfers expose your entire infrastructure map. CISA and leading security organizations consistently identify DNS as a critical attack surface that organizations systematically underestimate and under-protect.

Authoritative References

Definitions

Key Terms & Concepts

Understanding DNS reconnaissance requires familiarity with both the technical mechanisms of DNS and the tactical mindset of adversaries who exploit it. Below we break down the formal definition and provide an accessible analogy that illustrates why DNS mapping is so impactful.

📖 Simple Definition

DNS (T1590.002) is a sub-technique under MITRE ATT&CK's Reconnaissance tactic where adversaries systematically gather information about a target's Domain Name System configuration. This encompasses querying DNS record types including A (IPv4 addresses), AAAA (IPv6 addresses), MX (mail servers), NS (nameservers), TXT (text records), CNAME (canonical names), SOA (start of authority), and SRV (service records). Attackers perform subdomain enumeration using brute-force wordlists, certificate transparency logs, and search engine dorking. They attempt DNS zone transfers (AXFR) to download entire DNS zone files. They identify DNS server software versions and configurations through banner grabbing and version probing. DNS reconnaissance reveals the target's mail servers, web infrastructure, cloud service providers (through CNAME records pointing to AWS, Azure, or CloudFront), content delivery networks, internal network naming conventions, and even security technologies in use (such as proof-of-concept SPF, DKIM, and DMARC configurations). The intelligence gathered through DNS enumeration forms the foundation for virtually every subsequent attack phase.

🌐 Everyday Analogy

DNS is like the internet's phone book , it translates human-readable domain names (google.com) into machine-readable IP addresses (142.250.80.46) that computers use to route traffic. When an attacker maps your DNS, they are essentially stealing and photocopying your entire company directory. They learn every department and extension (subdomains like mail., vpn., admin., api.), they discover who handles your mail (MX records pointing to Google Workspace or Microsoft 365), they identify which third-party services you use (CNAME records revealing your cloud hosting on AWS S3, your CDN on CloudFront, or your support portal on Zendesk), and they even learn your internal naming patterns and conventions. It is like someone stealing your company phone directory and using it to systematically call every department, pretending to be the CEO, exploiting the fact that they know exactly who works where and who handles what. Every piece of DNS information narrows the attacker's focus and increases their probability of success.

Essential DNS Concepts for Security

Zone Transfer (AXFR)
A mechanism that copies the entire DNS zone file from a primary to a secondary nameserver. Attackers exploit misconfigured zones to download complete infrastructure maps in a single request, revealing every record the organization has configured.
DNS Cache Poisoning
An attack where forged DNS data is inserted into a resolver's cache, causing subsequent queries to return malicious IP addresses. Victims are silently redirected to attacker-controlled servers without any indication of compromise.
DNS Amplification
A reflection-based DDoS technique where attackers send small DNS queries with the victim's spoofed source IP to open resolvers. The resolvers send large responses to the victim, amplifying traffic volume by 28-54x.
DNSSEC
DNS Security Extensions add cryptographic signatures to DNS records, allowing resolvers to verify authenticity and integrity. DNSSEC prevents cache poisoning but requires careful key management and adds complexity to DNS operations.
Subdomain Brute-Force
Attackers systematically query thousands of potential subdomain names (from wordlists like SecLists or Assetnote) to discover forgotten services, staging environments, and internal tools that may be exposed to the public internet.
Reverse DNS (PTR)
Mapping IP addresses back to domain names using PTR records. Attackers scan IP ranges and perform reverse lookups to identify which organizations own specific network blocks, revealing infrastructure that may not be discoverable through forward lookups.
Case Study

Real-World Scenario: FinanceBridge Capital

Financial services firms are prime targets for DNS reconnaissance because their digital infrastructure directly maps to revenue-generating systems, client portals, and trading platforms. The following scenario illustrates how a single DNS misconfiguration can cascade into a devastating breach affecting thousands of clients.

AH

Ahmed Hassan

DNS Administrator
FinanceBridge Capital , Investment Management Firm

✕ Before: Exposed Infrastructure

FinanceBridge Capital had operated for over a decade with minimal DNS hardening. Their DNSSEC implementation was incomplete , only the root zone was signed, leaving all subdomains vulnerable to cache poisoning attacks. Zone transfers (AXFR) were permitted from any IP address, a default configuration that their previous administrator had never restricted. Their DNS TXT records contained verbose information including cloud provider names, internal server naming conventions, and even references to development and staging environments that were accessible via publicly resolvable subdomains. They had never conducted a DNS audit.


An APT group performing reconnaissance enumerated over 340 subdomains through brute-force DNS queries and certificate transparency log analysis. Among the discoveries, they found an unauthenticated testing API endpoint at test-api.financebridge.com that provided access to internal financial models and investment algorithms. The attacker exploited this testing endpoint to exfiltrate proprietary trading strategies of over 40 hedge fund clients, causing an estimated $230 million in regulatory fines, legal costs, and client attrition. The breach went undetected for 14 months because FinanceBridge had no DNS monitoring or alerting in place.

  • No DNSSEC on any subdomains , cache poisoning was trivially possible
  • AXFR zone transfers open to any IP , complete infrastructure exposed
  • Verbose TXT records leaked cloud provider and naming patterns
  • 340+ subdomains discovered by automated enumeration tools
  • test-api.financebridge.com had zero authentication enforcement
  • No DNS query monitoring or anomaly detection configured
  • 14 months of undetected data exfiltration via testing endpoint

✓ After: Hardened DNS Posture

Following the breach, Ahmed Hassan led a comprehensive DNS security overhaul that transformed FinanceBridge's security posture from fundamentally exposed to industry-leading. He implemented DNSSEC with NSEC3 signed zones across all domains and subdomains, preventing any possibility of DNS cache poisoning. He restricted zone transfers to only the IP addresses of authorized secondary nameservers using explicit allow-transfer ACLs in the BIND configuration. He systematically minimized TXT record information leakage, removing all references to internal infrastructure and cloud providers.


Ahmed deployed passive DNS monitoring using a combination of DNS query logging and real-time anomaly detection to identify suspicious enumeration patterns. He implemented split-horizon DNS architecture, serving different DNS responses to internal versus external queries, which completely hid internal infrastructure records from external reconnaissance. He set up automated subdomain discovery using the same techniques attackers employ, enabling FinanceBridge to detect unauthorized DNS entries before adversaries could find them. He also implemented response rate limiting (RRL) on all authoritative nameservers to slow down automated enumeration attempts.

  • Full DNSSEC with NSEC3 across all zones , cache poisoning eliminated
  • Zone transfers restricted to authorized secondary IPs only
  • TXT records minimized to SPF, DKIM, and DMARC only
  • Split-horizon DNS hides all internal records from external queries
  • Passive DNS monitoring detects enumeration within minutes
  • Automated subdomain discovery identifies rogue entries proactively
  • Response rate limiting throttles brute-force enumeration attempts
Attack Methodology

7-Step DNS Reconnaissance Attack Chain

Adversaries follow a methodical, multi-stage approach to DNS reconnaissance. Each step builds upon the intelligence gathered in previous phases, progressively expanding their knowledge of the target's infrastructure while maintaining stealth to avoid detection by security teams.

Step 1 of 7

Passive DNS Footprinting

The attacker begins with passive reconnaissance using publicly available sources. This includes querying WHOIS databases for domain registration details, searching certificate transparency logs (crt.sh) for issued certificates that reveal subdomains, and using search engines with specialized queries (Google dorking) to find DNS-related information indexed by crawlers. Historical DNS records from services like SecurityTrails and PassiveTotal reveal infrastructure changes over time, including previously used IPs and decommissioned subdomains that may still point to active services. This phase generates zero traffic to the target's infrastructure.

Step 2 of 7

DNS Record Enumeration

Armed with the initial footprint, the attacker queries the target's authoritative nameservers for every DNS record type. They use tools like dig, nslookup, and dnsrecon to systematically extract A, AAAA, MX, NS, TXT, CNAME, SOA, SRV, and PTR records. Each record type reveals different infrastructure details: MX records identify email providers, CNAME records expose cloud service dependencies, NS records reveal DNS hosting providers, and TXT records often contain sensitive configuration data including SPF policies, domain verification tokens, and sometimes even internal service URLs or API endpoints.

Step 3 of 7

Subdomain Brute-Force

The attacker runs automated subdomain discovery using comprehensive wordlists containing hundreds of thousands of potential subdomain names. Tools like subfinder, amass, and ffuf iterate through wordlists querying the target's DNS resolvers for each potential subdomain. Common discoveries include forgotten development servers (dev., staging.), internal tools accidentally exposed (internal., admin.), cloud service endpoints (s3., cdn., api.), VPN gateways (vpn., remote.), and third-party integrations. Each discovered subdomain is a potential attack surface that security teams may not be monitoring or protecting.

Step 4 of 7

Zone Transfer Attempts

The attacker attempts AXFR (zone transfer) queries against the target's authoritative nameservers. If zone transfers are not properly restricted, the attacker can download the complete DNS zone file in a single request, obtaining every DNS record the organization has configured , including records that would never be discovered through individual queries. Zone transfer data includes SOA records with administrator contact information, refresh and expiry timers that reveal operational procedures, and sometimes even internal-only records that administrators forgot to exclude from the transferable zone. This is the highest-yield DNS attack when successful.

Step 5 of 7

DNS Server Fingerprinting

The attacker probes DNS servers to identify software versions and configurations. By analyzing DNS response headers, EDNS0 options, banner information, and behavioral characteristics (such as response timing patterns and error message formats), attackers can determine whether the target uses BIND, Microsoft DNS Server, PowerDNS, Unbound, or other DNS software. Version information enables the attacker to search for known vulnerabilities (like CVE-2025-40778 for BIND9) and craft targeted exploitation strategies against specific DNS server implementations.

Step 6 of 7

Reverse DNS Mapping

The attacker performs PTR record lookups against IP ranges associated with the target organization, mapping IP addresses back to domain names. This reverse mapping often reveals infrastructure that is not discoverable through forward DNS queries, including load balancers, database servers, backup systems, and internal services that have PTR records but no corresponding A records in the public DNS zone. Combined with BGP and ASN data, the attacker builds a complete network topology map showing how the target's infrastructure is organized across data centers, cloud providers, and network segments.

Step 7 of 7

Infrastructure Correlation & Target Selection

In the final phase, the attacker correlates all gathered DNS intelligence into a comprehensive attack surface map. They identify the most vulnerable and high-value targets: outdated DNS servers running vulnerable software versions, subdomains pointing to deprecated infrastructure, cloud services with misconfigured access controls (revealed through CNAME analysis), and email servers that could be targeted for phishing campaigns. The DNS reconnaissance data feeds directly into subsequent attack phases , vulnerability scanning (T1595), active scanning (T1595.002), and initial access (T1190). The attacker now possesses a complete blueprint of the target's internet-facing infrastructure.

Critical Errors

Common DNS Security Mistakes

Organizations repeatedly make the same DNS configuration errors that adversaries eagerly exploit. These mistakes are often invisible to IT teams because DNS changes rarely trigger alerts, and the consequences only become apparent months later when the gathered intelligence is used in an actual attack.

🔓

Open Zone Transfers (AXFR)

Allowing DNS zone transfers from any IP address is the single most damaging DNS misconfiguration. It gives attackers your complete DNS zone file , every subdomain, every record, every timestamp , in a single request with no authentication required.

✓ Fix: Restrict AXFR to authorized secondary nameserver IPs only using allow-transfer ACLs in your DNS server configuration.
📝

Verbose TXT Records

TXT records containing domain verification tokens, internal URLs, API endpoints, and administrative notes provide attackers with direct intelligence about your infrastructure, cloud providers, and internal tools that would otherwise require significant effort to discover.

✓ Fix: Audit all TXT records and remove everything except essential SPF, DKIM, and DMARC entries. Use generic verification tokens without revealing internal information.
🚫

No DNSSEC Implementation

Without DNSSEC, DNS responses cannot be cryptographically verified, making cache poisoning attacks trivially possible. Attackers can forge DNS responses and redirect traffic to malicious servers, and users have no way to detect the manipulation.

✓ Fix: Implement DNSSEC with NSEC3 (to prevent zone walking) on all authoritative zones. Use DNSSEC-aware registrars and enable DNSSEC validation on recursive resolvers.
👻

Forgotten/Stale Subdomains

Development servers (dev., staging.), test environments (test., qa.), and deprecated services that were never decommissioned remain accessible and often lack security controls. These shadow IT assets are prime targets for initial access and lateral movement.

✓ Fix: Implement automated subdomain discovery using the same tools attackers use. Maintain an inventory and decommission unused subdomains immediately with proper DNS record cleanup.
📡

No DNS Monitoring or Logging

Most organizations have no visibility into who is querying their DNS servers. Without DNS query logging and monitoring, enumeration attacks, zone transfer attempts, and unusual query patterns go completely undetected for months or years.

✓ Fix: Enable DNS query logging on all authoritative nameservers. Deploy anomaly detection to flag high-volume queries from single sources, repeated AXFR attempts, and unusual record type queries.
🔍

Information Leakage via CNAME Records

CNAME records that point to cloud providers (cdn.cloudflare.com, s3.amazonaws.com, azureedge.net) reveal your technology stack, hosting infrastructure, and third-party dependencies. Attackers use this to target specific cloud platforms with platform-specific attacks.

✓ Fix: Where possible, use A records instead of CNAME records to obscure cloud provider relationships. Implement CNAME flattening or use your own branded nameservers through proxy services.
Adversary vs Defender

Red Team vs Blue Team: DNS Warfare

DNS reconnaissance is a constant battle between attackers trying to extract intelligence and defenders trying to minimize exposure while maintaining legitimate functionality. Understanding both perspectives is essential for building effective defenses.

🔴 Red Team , Attack Methodology

Red teamers and adversaries approach DNS as a goldmine of pre-attack intelligence. Their goal is to extract maximum information with minimum detection, building a complete infrastructure map before any exploitation begins.

  1. Begin with passive OSINT: WHOIS, crt.sh certificate logs, SecurityTrails, Shodan, and Google dorking to build initial subdomain lists
  2. Run active enumeration using subfinder, amass, sublist3r, and OneForAll with comprehensive wordlists (SecLists, Assetnote) to discover forgotten subdomains
  3. Perform DNS record queries for all record types (A, AAAA, MX, NS, TXT, CNAME, SOA, SRV, PTR) using dig, dnsrecon, and dnscan
  4. Attempt AXFR zone transfers against all authoritative nameservers with dnsrecon --type axfr and fierce
  5. Fingerprint DNS server software versions through response analysis and CHAOS TXT queries (version.bind, hostname.bind)
  6. Map infrastructure using reverse DNS sweeps across discovered IP ranges and correlate with ASN/BGP data
  7. Identify cloud providers through CNAME analysis and search for cloud-specific misconfigurations (open S3 buckets, exposed API gateways)

Primary tools: dig nslookup dnsrecon subfinder amass ffuf fierce dnscan SecurityTrails crt.sh

🔵 Blue Team , Defensive Strategy

Blue team defenders must balance accessibility with security, ensuring DNS functions correctly for legitimate users while denying adversaries the intelligence they need. The key is proactive defense through hardening, monitoring, and continuous assessment.

  1. Implement DNSSEC with NSEC3 on all authoritative zones to prevent cache poisoning and zone walking via NSEC enumeration
  2. Restrict zone transfers using explicit allow-transfer ACLs limiting AXFR to only known secondary nameserver IP addresses
  3. Deploy split-horizon DNS to serve different responses to internal vs. external queries, hiding internal infrastructure from external reconnaissance
  4. Enable comprehensive DNS query logging on authoritative nameservers with centralized analysis using ELK stack or Splunk
  5. Implement response rate limiting (RRL) to throttle high-volume queries that indicate automated enumeration attempts
  6. Conduct regular DNS audits using the same tools attackers use to identify what an adversary would discover before they find it
  7. Minimize information leakage by auditing TXT records, avoiding descriptive CNAME targets, and removing stale or deprecated DNS entries

Key defenses: DNSSEC RRL Split-Horizon AXFR ACLs DNS Query Logging Passive DNS PII Redaction Cloudflare Proxy

Detection Engineering

Threat Hunter's Playbook: Detecting DNS Reconnaissance

Threat hunting for DNS reconnaissance requires a combination of passive monitoring, behavioral analysis, and proactive assessment. The following playbook provides detection queries, hunting hypotheses, and indicators of compromise that security teams can immediately implement.

🔍 Detection Queries (DNS Logs)

Use these queries against your DNS query logs to identify potential reconnaissance activity. High query volumes from single sources, unusual record type queries, and repeated zone transfer attempts are strong indicators of adversarial DNS enumeration.

# Detect high-volume DNS queries from single source # Threshold: > 100 unique queries in 5 minutes source_ip="*" | stats count, dc(query_name) as unique_queries by source_ip, timebin(5m) where unique_queries > 100 # Detect AXFR zone transfer attempts record_type="AXFR" OR query_type=252 | stats count by source_ip, target_domain # Detect ANY query usage (information gathering) query_type="ANY" | stats count by source_ip where count > 50 # Detect DNS version enumeration (CHAOS TXT) query_name="version.bind" OR query_name="hostname.bind" | stats count by source_ip

🎯 Hunting Hypotheses

Use these threat hunting hypotheses to proactively search for DNS reconnaissance in your environment. Each hypothesis represents a specific attack behavior that can be validated through log analysis and network monitoring.

  • Hypothesis 1: An adversary is performing subdomain enumeration against our authoritative nameservers using automated tools, which will manifest as high volumes of NXDOMAIN responses from single source IPs over short time periods.
  • Hypothesis 2: An adversary is attempting AXFR zone transfers from multiple source IPs to determine if zone transfers are restricted, which will appear as repeated SOA queries followed by AXFR attempts from the same IP.
  • Hypothesis 3: An adversary is using certificate transparency logs to discover our subdomains, which will manifest as DNS queries for newly discovered subdomains appearing within 24 hours of certificate issuance events.
  • Hypothesis 4: An adversary is performing reverse DNS sweeps against our IP ranges, which will appear as concentrated PTR queries against sequential or nearby IP addresses from single sources.
  • Hypothesis 5: An adversary is fingerprinting our DNS server software version, which will appear as CHAOS TXT class queries for version.bind or hostname.bind from unusual source IPs.

⚡ Indicators of Compromise (IOCs)

Monitor for these specific indicators that suggest active DNS reconnaissance targeting your organization. These IOCs should be integrated into your SIEM detection rules and reviewed during security operations center triage.

Network-Level Indicators

  • High NXDOMAIN response rate (>500/min) from single source IP
  • Repeated AXFR (port 53 TCP) connection attempts from external IPs
  • CHAOS TXT class queries (CLASS 3) for version.bind or hostname.bind
  • DNS ANY queries targeting authoritative nameservers
  • Sequential PTR queries across adjacent IP ranges
  • Unusual EDNS0 client subnet options indicating VPN/proxy usage

Behavioral Indicators

  • DNS queries for known subdomain wordlist entries (admin, test, dev, staging, vpn, mail, api, internal, backup, db, ftp, ssh, portal)
  • Queries for DNS record types rarely used by legitimate users (SOA, SRV, PTR) from external sources
  • Queries arriving at rates consistent with automated tools (>10 queries/second sustained)
  • DNS queries for both forward and reverse records of the same IP/domain in rapid succession
  • Source IPs querying subdomains that were recently exposed through certificate transparency logs
  • DNS responses exceeding typical sizes, suggesting data exfiltration via DNS tunneling
Take Action

Secure Your DNS Infrastructure Now

DNS reconnaissance is the silent first step of nearly every cyber attack. The intelligence adversaries gather through DNS enumeration shapes every subsequent decision in their attack chain. If you haven't audited your DNS configuration, you are already compromised , you just don't know what the attacker knows about you yet.

DONATE · SUPPORT

We keep threat intelligence free. No paywalls, no ads. Your donation directly funds server infrastructure, research, and tools. Every contribution - no matter the size - makes this platform sustainable.
100% of your support goes to the platform. No corporate sponsors, just the community.
ROOT::DONATE

Leave a Comment

Your email address will not be published. Required fields are marked *



Ask ChatGPT
Set ChatGPT API key
Find your Secret API key in your ChatGPT User settings and paste it here to connect ChatGPT with your Courses LMS website.
Certification Courses
Hands-On Labs
Threat Intelligence
Latest Cyber News
MITRE ATT&CK Breakdown
All Cyber Keywords

Every contribution moves us closer to our goal: making world-class cybersecurity education accessible to ALL.

Choose the amount of donation by yourself.