Fierce – DNS Mapping Tool
Fierce – DNS Mapping Tool
Fierce is a DNS reconnaissance tool used for network mapping and finding subdomains of a target domain. It is commonly used in penetration testing to identify exposed assets and weak points in an organization’s DNS infrastructure. Fierce is designed to be quick and efficient, making it an essential tool for security professionals.
Fierce Features
Some of the tool features are as follows:
- Performs DNS reconnaissance to find subdomains.
- Identifies misconfigured or publicly accessible DNS records.
- Attempts zone transfers to gather information about a domain.
- Performs brute-force enumeration using a built-in wordlist.
- Detects and maps IP ranges associated with a domain.
Install Fierce
Fierce is included in Kali Linux by default. However, if you need to install it, use:
$ sudo apt-get install fierce
Basic Subdomain Enumeration
To find subdomains associated with a target domain, use the following command:
$ fierce -dns example.com
This command scans for subdomains of example.com using default settings.
Using a Custom DNS Server
To specify a custom DNS server for the scan, use:
$ fierce -dns example.com -dnsserver 8.8.8.8
This command forces the scan to use Google’s public DNS server (8.8.8.8).
Scanning a Specific IP Range
To map the IP range associated with a domain, use:
$ fierce -dns example.com -range 192.168.1.0-192.168.1.255
This helps in identifying all active hosts within a specified IP range.
Brute-Force Subdomain Discovery
To use brute-force techniques for finding hidden subdomains, run:
$ fierce -dns example.com -wordlist /usr/share/wordlists/dnsmap.txt
This command attempts to discover subdomains using a custom wordlist.
Performing a Zone Transfer
To check if a domain allows unauthorized zone transfers, use:
$ fierce -dns example.com -zone
If successful, this reveals all DNS records associated with the domain.
Fierce is a fast and efficient tool for DNS reconnaissance and network mapping. It helps penetration testers identify publicly accessible assets, misconfigured DNS records, and potential security vulnerabilities in an organization’s network.