Adidnsdump - Active Directory Integrated Dns Dumping Past Times Whatever Authenticated User


By default whatever user inwards Active Directory tin enumerate all DNS records inwards the Domain or Forest DNS zones, like to a zone transfer. This tool enables enumeration in addition to exporting of all DNS records inwards the zone for recon purposes of internal networks.
For to a greater extent than info, read the associated spider web log post.

Install in addition to usage
You tin either install the tool via pip amongst pip install adidnsdump or install it from git to bring the latest version:
git clone https://github.com/dirkjanm/adidnsdump cd adidnsdump pip install .
or
pip install git+https://github.com/dirkjanm/adidnsdump#egg=adidnsdump
The tool requires impacket in addition to dnspython to function. While the tool works amongst both Python 2 in addition to 3, Python iii back upwards requires you lot to install impacket from GitHub.
Installation adds the adidnsdump ascendancy to your PATH. For help, try adidnsdump -h. The tool tin move used both straight from the network in addition to via an implant using proxychains. If using proxychains, brand certain to specify the --dns-tcp option.