Created
March 8, 2026 03:38
-
-
Save EvgeniGordeev/d1db5de0cef62f53a4d90da2b973b3c4 to your computer and use it in GitHub Desktop.
DNS detective
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/bin/bash | |
| # reveals all records on DNS root | |
| dig example.com ANY | |
| # BUT some DNS providers would return a string with RFC8482 - ANY keyword used for debugging | |
| # has been misused in DDoS attacks and banned in January 2019 | |
| # that's why we can use bash loop | |
| DOMAIN="example.com"; for t in SOA NS A AAAA CNAME MX TXT CAA SRV HTTPS DS; do dig +noall +answer +multiline $DOMAIN $t; done |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment