-
Notifications
You must be signed in to change notification settings - Fork 5
/
Copy path_dnsrecon
41 lines (39 loc) · 2.61 KB
/
_dnsrecon
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
#compdef dnsrecon
local types=(
'std[SOA, NS, A, AAAA, MX and SRV]'
'brt[Brute force domains and hosts using a given dictionary]'
'rvl[Reverse lookup of a given CIDR or IP range]'
'srv[SRV records]'
'axfr[Test all NS servers for a zone transfer]'
'bing[Perform Bing search for subdomains and hosts]'
'yand[Perform Yandex search for subdomains and hosts]'
'crt[Perform crt.sh search for subdomains and hosts]'
'snoop[Perform cache snooping against all NS servers for a given domain testing all with file containing the domains]'
'tld[Remove the TLD of given domain and test against all TLDs registered in IANA]'
'zonewalk[Perform a DNSSEC zone walk using NSEC records]'
)
_arguments \
'(-d --domain)'{-d,--domain}'[Target domain]:()' \
'(-n --name_server)'{-n,--name_server}'[Comma separated domain servers to use (if none is given, the SOA of the target domain will be used)]:()' \
'(-r --range)'{-r,--range}'[IP range for reverse lookup brute force in formats first-last or range/bitmask]:()' \
'(-D --dictionary)'{-D,--dictionary}'[Dictionary file of subdomain and hostnames to use for brute force]:select file:_files' \
'-v[Enable verbose]' \
'-f[Filter out of brute force domain lookup, records that resolve to the wildcard defined IP address when saving records]' \
'(-t --type)'{-t,--type}'[Type of enumeration to perform]:select type:_values type $types' \
'-a[Perform AXFR with standard enumeration]' \
'-s[Perform a reverse lookup of IPv4 ranges in the SPF record with standard enumeration]' \
'-g[Perform Google enumeration with standard enumeration]' \
'-b[Perform Bing enumeration with standard enumeration]' \
'-k[Perform crt.sh enumeration with standard enumeration]' \
'-w[Perform deep whois record analysis and reverse lookup of IP ranges found through Whois when doing a standard enumeration]' \
'-z[Performs a DNSSEC zone walk with standard enumeration]' \
'--threads[Number of threads to use in reverse lookups, forward lookups, brute force and SRV record enumeration]:()' \
'--lifetime[Time to wait for a server to response to a query]:enter time:()' \
'--tcp[Use TCP protocol to make queries]' \
'--db[SQLite 3 file to save found records]:select file:_files' \
'(-x --xml)'{-x,--xml}'[XML file to save found records]:select file:_files' \
'(-c --csv)'{-c,--csv}'[Comma separated value file]:select file:_files' \
'(-j --json)'{-j,--json}'[JSON file]:select file:_files' \
'--iw[Continue brute forcing a domain even if a wildcard records are discovered]' \
'--disable_check_recursion[Disables check for recursion on name servers]' \
'--disable_check_bindversion[Disables check for BIND version on name servers]'