From this LinkedIn post How to spear phish someone in 2024 even if SPF is enabled and active
dig @1.1.1.1 TXT _dmarc.grayhatacademy.com
; <<>> DiG 9.16.38 <<>> @1.1.1.1 TXT _dmarc.grayhatacademy.com ; (1 server found) ;; global options: +cmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 1585 ;; flags: qr rd ra ad; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1 ;; OPT PSEUDOSECTION: ; EDNS: version: 0, flags:; udp: 1232 ;; QUESTION SECTION: ;_dmarc.grayhatacademy.com. IN TXT ;; ANSWER SECTION: _dmarc.grayhatacademy.com. 600 IN TXT "v=DMARC1; p=quarantine; rua=mailto:terry@grayhatacademy.com; pct=100; sp=none; adkim=r; aspf=r" ;; Query time: 31 msec ;; SERVER: 1.1.1.1#53(1.1.1.1) ;; WHEN: Mon Mar 25 20:47:16 GMT Standard Time 2024 ;; MSG SIZE rcvd: 161
'v=DMARC1; p=none;…'' is what you are looking for