Python App #18

DNS Recon

DNS Recon performs comprehensive DNS enumeration for any domain. Query all standard record types (A, AAAA, MX, NS, TXT, SOA, CNAME, PTR, SRV, CAA), validate email security with SPF, DMARC, and DKIM checks, detect DNSSEC support, and use custom DNS servers. Essential for domain investigation and email security assessment.

dnsenumerationspfdmarcdkimdnssec

Last updated:

Features

  • A, AAAA, MX, NS, TXT, SOA, CNAME records
  • PTR (reverse DNS) lookups
  • SRV record discovery (common services)
  • CAA record enumeration
  • SPF record validation
  • DMARC record check
  • DKIM discovery (15 common selectors)
  • DNSSEC (DNSKEY) detection
  • Custom DNS server support
  • HTML session export

Quick Start

# 1. Extract the zip and enter the folder
cd 18-DNS-Recon

# 2. Install dependencies
python install_requirements.py

# 3. Launch the tool
python dns_recon.py

Download

Tool: DNS Recon
File: 18-DNS-Recon.zip
Python: 3.8+
OS: Windows, macOS, Linux
Dependencies: customtkinter, dnspython

Downloads are free — clicking the link below opens a short ad that helps support Max Intel. Thank you! Wait 15 seconds after clicking to unlock.

Click here for an ad
15
seconds remaining…
✓ Unlocked — thank you!
← All Python OSINT Apps

What Does DNS Reconnaissance Include?

DNS recon queries all record types — A, AAAA, MX, NS, TXT, SOA, CNAME, PTR, SRV, CAA — plus SPF, DMARC, DKIM, and DNSSEC. The DNS, standardized in RFC 1035, is the foundational mapping target in the OWASP Testing Guide v4.2 (Section 4.1.6).

Email Security Assessment

The tool checks SPF (RFC 7208), DKIM (RFC 6376), and DMARC (RFC 7489). According to Valimail (2024), only 28% of domains have proper DMARC enforcement, leaving the majority vulnerable to spoofing. The tool validates syntax, checks DKIM selectors, and assesses DMARC policy strength.

DNSSEC and Infrastructure Mapping

DNSSEC (RFC 4033-4035) signs DNS records to prevent cache poisoning. According to APNIC, only about 30% of queries validate DNSSEC. Combined with NS, MX, and SOA analysis, investigators can map complete DNS infrastructure and detect misconfigurations.

🌐 DNS Recon — Frequently Asked Questions

What DNS record types does this tool query?

The tool queries A, AAAA, MX, NS, TXT, SOA, and CNAME records. It also checks for zone transfer vulnerabilities and performs basic subdomain enumeration using common wordlists.

Does the DNS reconnaissance tool require installation?

No. The tool runs entirely in your browser using client-side Python via Pyodide. No installation, API keys, or server-side processing required. Your queries are executed locally for maximum privacy.

What can I do with the DNS reconnaissance tool?

You can enumerate DNS records, discover subdomains, and map DNS infrastructure. The tool provides a clean interface with exportable results and cross-links to related Max Intel tools for deeper investigation.