Network Security

Find the DNS Posture Issues Other Scanners Miss

DNS Surface Audit goes beyond record enumeration. It probes for browser-side rebinding susceptibility, wildcard pollution that breaks subdomain enumeration, internal RFC1918 IP addresses leaked into your public zone, open recursion on authoritative nameservers, version disclosure via CHAOS-class queries, and split-horizon leaks via EDNS0 Client-Subnet — six findings classes that directly change how the rest of the pentest runs against the same target.

Try DNS Surface Audit

Six checks: rebinding susceptibility · wildcard DNS · internal IP leakage · open recursion · NS version disclosure · split-horizon. 2 free runs/day.

How It Works

From target input to actionable findings in three straightforward steps.

01

Enter a Domain

Supply the apex domain (example.com). The audit resolves authoritative nameservers, queries them directly, and runs six independent posture checks against each.

02

Six Posture Checks Run in Parallel

Rebinding susceptibility (TTL + answer rotation), wildcard DNS, internal-IP leakage in any record type, off-zone open recursion, CHAOS version.bind disclosure, EDNS0 Client-Subnet split-horizon leak. Each check produces a structured finding with severity and evidence.

03

Downstream Pentest Auto-Consumes the Flags

When you launch a web or API pentest against the same domain, the audit results pre-populate the scanner. SSRF rebinding-payload mode activates if rebinding is practical; the SSRF target corpus inherits every leaked internal IP; the subdomain enumerator filters wildcard noise; cache-poisoning escalates from passive to active when an open resolver is present.

Key Capabilities

Purpose-built scanning backed by real penetration testing expertise.

Rebinding Susceptibility Detection

Combined TTL analysis and back-to-back resolution diffs catch DNS setups where browser-side rebinding attacks become practical against authenticated users of your own application.

Wildcard DNS Discovery

Three high-entropy random-label probes detect *.<zone> wildcards so the subdomain enumerator can filter the noise and produce a real attack-surface inventory.

Internal IP Leakage Hunt

Scans every A / AAAA / CNAME / TXT record plus NS glue for RFC1918 / loopback / link-local addresses leaked into the public zone — each becomes a priority SSRF target.

Open-Recursion Detection on Authoritative NS

Probes each authoritative nameserver with an off-zone recursive query — open resolvers are weaponisable for cache poisoning and amplification. Confirmed via the RA flag.

NS Version Disclosure (CHAOS)

Sends version.bind and hostname.bind queries against each NS. Disclosed BIND / NSD / PowerDNS / Knot builds feed into the platform CVE retro-match workflow.

Split-Horizon Leak via EDNS0 Client-Subnet

Forges EDNS0 Client-Subnet declaring an RFC1918 source and compares against the public answer; non-overlapping private answers indicate the internal view is reachable from the public internet.

Common Use Cases

Pre-engagement reconnaissance before authorising a web or API pentest — light the downstream scanner up with the right detector modes
External attack-surface management — find leaked internal IPs and split-horizon misconfigurations before they show up in a breach report
Cloud / migration audits — confirm DNSSEC adoption + verify no internal-only resources accidentally leaked into the public zone
SOC tabletop input — feed the open-resolver and rebinding findings into incident-response runbooks

Why Use Pentestas

Security tools built by penetration testers, not just developers.

Enterprise-Grade Accuracy

Our scanning engine is built on the same methodologies our penetration testers use in manual engagements, tuned to minimize false positives and surface genuine risk.

Fast, Actionable Results

Get findings in minutes rather than days. Every result includes severity ratings, technical evidence, and clear remediation steps your team can act on immediately.

Continuous Monitoring

Schedule recurring scans from the Pentestas platform to catch regressions before they reach production. Stay ahead of new CVEs and configuration drift.

Privacy First

Your scan data is encrypted at rest and in transit. You own your data, with full control over retention and export.

Detailed Reporting

Export findings as PDF, CSV, or JSON. Feed results directly into your SIEM, ticketing system, or CI/CD pipeline through our REST API.

Instant Setup

Run scans directly from your browser. Enter a target, click scan, and receive results. Ready in under a minute.

Start scanning with DNS Surface Audit today

Create a free account and run your first scan in under a minute. Full platform access during your 14-day trial.

Frequently Asked Questions

Why is this different from a normal DNS lookup tool?
A DNS lookup returns records. This audit interrogates posture — does the resolver permit recursion it should not, does the zone leak internal hostnames, is the answer set rotating in a way attackers can exploit. The output is findings, not records.
Does it modify my DNS in any way?
No. Every probe is a read-only query. We send TXT, A, AAAA, MX, NS, and CHAOS-class lookups; we never attempt updates, dynamic-DNS writes, or zone transfers as part of the surface audit.
How does the audit help with subdomain enumeration?
If your zone has a wildcard record, every randomly-guessed subdomain looks valid — enumeration becomes noise. The audit detects the wildcard and produces the wildcard IPs so the downstream scan filters its findings against them.
What happens if I run this then launch a pentest against the same domain?
The pentest auto-consumes the audit flags. SSRF rebinding mode activates if rebinding is practical, every leaked internal IP joins the SSRF target corpus, the subdomain enumerator filters wildcards, cache-poisoning escalates from passive to active when an open resolver is present. You get a sharper scan without a separate configuration step.
Related reads

Go deeper on network security