dns-discovery


DNS-Discovery is a multithreaded subdomain bruteforcer.

Introduction.

DNS-Discovery is a multithreaded subdomain bruteforcer meant to be used by pentesters during the initial stages of testing. It uses a wordlist that concatenates with a given domain to search for subdomains.

DNS-Discovery resolve and display IPv4 and IPv6. It's similar to others tools, like dnsmap, but multithreaded. It was tested in GNU/Linux 2.6.38 and FreeBSD 8.1-STABLE.

Download

http://dns-discovery.googlecode.com

Compiling $ make

Usage ``` usage: ./dns-discovery [options] options: -w (default : wordlist.wl) -t (default : 1) -r -c

ex:

$ ./dns-discovery google.com -w wordlist -t 5 -r reportfile _ _ ____ _ _
/ _ \/ |/ / __/_
/ _ (_)__ _ _ _ __ / // / /\ \// // / (-) _/ // / /__//|// /_///__/_//_// _, / //
by m0nad

DOMAIN: google.com THREADS: 5 REPORT: reportfile WORDLIST: wordlist

accounts.google.com IPv4 address: 209.85.195.84

ads.google.com IPv4 address: 72.14.204.112

ipv6.google.com IPv6 address: 2001:4860:b009::68

... ```

Similar tools

dnsmap http://dnsmap.googlecode.com/

fierce http://ha.ckers.org/fierce/

dnsenum http://dnsenum.googlecode.com/

Feedback

You can send me a email to: m0nad at email.com

Project Information

The project was created on Sep 20, 2011.