Skip to content
Active Directory Integrated DNS dumping by any authenticated user
Branch: master
Clone or download
Latest commit 5bb6347 Apr 29, 2019
Permalink
Type Name Latest commit message Commit time
Failed to load latest commit information.
adidnsdump add support for legacy partition (fix #1) Apr 26, 2019
.editorconfig initial commit Apr 24, 2019
.gitignore initial commit Apr 24, 2019
LICENSE Initial commit Apr 24, 2019
README.md add blog url Apr 25, 2019
setup.py v1.1.0 Apr 29, 2019

README.md

Active Directory Integrated DNS dump tool

Python 2.7 and 3 compatible PyPI version License: MIT

By default any user in Active Directory can enumerate all DNS records in the Domain or Forest DNS zones, similar to a zone transfer. This tool enables enumeration and exporting of all DNS records in the zone for recon purposes of internal networks.

For more info, read the associated blog post.

Install and usage

You can either install the tool via pip with pip install adidnsdump or install it from git to have the latest version:

git clone https://github.com/dirkjanm/adidnsdump
cd adidnsdump
pip install .

or

pip install git+https://github.com/dirkjanm/adidnsdump#egg=adidnsdump

The tool requires impacket and dnspython to function. While the tool works with both Python 2 and 3, Python 3 support requires you to install impacket from GitHub.

Installation adds the adidnsdump command to your PATH. For help, try adidnsdump -h. The tool can be used both directly from the network and via an implant using proxychains. If using proxychains, make sure to specify the --dns-tcp option.

You can’t perform that action at this time.