🛠️
Ghoul's Den
WebsiteGhoulsec-Vault
  • Ghoul's Den
  • Index of Tools
  • Index of Links
  • Top Ports
  • Initial Environment Deployment
    • Python3 & Pip Installation
    • Docker 🛳
    • Setting up AWS CLI
    • Msfconsole
    • Netplan configuration & Cloudinit
    • Wordlist Generation - CEWL
    • Apache2 Server
  • Information Gathering & Recon Tools
    • GHDB : Google Hacking Database
    • Sherlock : Social Media Footprinting
    • Nslookup
    • Dig (Domain Information Groper)
    • Recon-ng
    • HTTrack & Web Data Extractor
    • Email Tracker Pro
    • Shodan
    • ARIN Website Registry
  • Network Scanning Enumaration & Vulnerability Detection Tools
    • NMAP & SuperENUM
    • Nmap
      • Target Specification
      • Host Discovery
      • Port Scanning Techniques
      • Port Specification & Scan Order
      • Service Version Detection
      • OS Detection
      • Nmap Scripting Engine
      • Timing & Performance
      • FW / IDS / IPS Evasion
      • Miscellaneous Options
    • Colasoft Packet Builder & Megaping
    • Global Network Inventory
    • LDAP Enumeration > Active Directory Explorer
    • NetBIOS Enumerator
    • SMBEagle
    • RPC Scan
    • Nikto - Web Application Scanner
    • Enum4Linux
  • File Sharing Enumeration
  • Cloud Computing
    • AAD Internals
    • AWS CLI & S3
    • Trivy Scanner
    • S3 Scanner
    • LazyS3
  • Cryptography & stegnography
    • Veracrypt
    • Cryptanalysis Tools
    • Whitespace Cryptography - Snow
    • Creating a Self signed certificate in IIS
    • Steghide & Stegcracker
    • snow
  • Wireless Attacks
    • Aircrack-ng
  • Mobile Attacks
    • PhoneSploit-Pro
    • AndroRAT
    • ADB
  • SQL Injection Vulnerability
    • SQLMap
    • DSSS
  • IOT & OT Hacking
  • Social Engineering
  • Honeypot & IDS
    • Cowrie Honeypot
  • Sniffing & DDos
    • Sniffing
      • Capturing Remote packets using Wireshark
      • Detecting Sniffing using Nmap
    • Denial of Service (Dos & DDos)
      • DDos Protection using DDos Guardian
  • Malware Attacks
  • Password Cracking & Windows exploitation tools
    • Hydra
    • John
    • Hashcat
    • CrackMapExec
    • Impacket
    • Powerview
    • BitsAdmin
    • Rubeus (Kerberoasting) & Winpeas
    • AD-DC Querying
    • mstsc - RDP
  • System hacking & buffer overflow
    • Responder
    • Reverse Shell Generator
    • Clearing Traces
  • Session Hijacking
    • Caido
    • Bettercap
  • Web Servers & Applications
  • Linux Fundamentals
    • Find Command
    • Grep Command
Powered by GitBook
On this page
  1. Information Gathering & Recon Tools

Dig (Domain Information Groper)

The dig (short for Domain Information Groper) command is a network tool used for querying DNS (Domain Name System) servers to obtain information about domain names and IP addresses. It is commonly used by network administrators, IT professionals, and developers to troubleshoot DNS-related issues or to gather DNS data for a particular domain.

Common uses of dig:

  1. Domain Name Resolution:

    • To find the IP address associated with a domain name.

    • Example: dig example.com

  2. DNS Record Lookup:

    • To retrieve different types of DNS records like A (IPv4), AAAA (IPv6), MX (Mail Exchange), TXT (Text), and others.

    • Example: dig example.com MX (returns mail server records for the domain)

  3. Check DNS Server Response:

    • You can query specific DNS servers to see how they resolve a domain.

    • Example: dig @8.8.8.8 example.com (queries Google's DNS server for information about example.com)

  4. Trace the DNS Resolution Path:

    • To trace how a domain name is resolved by querying each step along the way.

    • Example: dig +trace example.com

  5. Query DNS for Specific Information:

    • You can specify the type of record you want to query, such as A, AAAA, MX, or TXT.

    • Example: dig example.com TXT

  6. Checking DNS Propagation:

    • To verify whether DNS changes have propagated across the global DNS infrastructure.

  7. Check for DNS Misconfigurations:

    • To help identify issues with a domain’s DNS setup or check if the DNS server is returning correct results.

PreviousNslookupNextRecon-ng

Last updated 5 months ago