[index][raw][main] [noise@unvalidatedinput]$ man DNS_bruteforce DNS_bruteforce(1) User Manuals DNS_bruteforce(1) NAME DNS bruteforce Sun Apr 26 12:41:41 BST 2015 DESCRIPTION Just a few tools to run a dns brute force enumeration. Some tools like Fierece or Dnsmap do handle wildcard DNS correctly. Fierce $ fierce -dns test.com -wordlist /usr/share/fierce/hosts.txt DNS Servers for test.com: ns66.worldnic.com ns65.worldnic.com Trying zone transfer first... Testing ns66.worldnic.com Request timed out or transfer not allowed. Testing ns65.worldnic.com Request timed out or transfer not allowed. Unsuccessful in zone transfer (it was worth a shot) Okay, trying the good old fashioned way... brute force Checking for wildcard DNS... ** Found 94496356619.test.com at 192.99.166.230. ** High probability of wildcard DNS. Now performing 2280 test(s)... 208.112.2.147 mail.test.com 76.12.20.251 secure.test.com 66.241.194.12 ws10.test.com 66.241.194.13 ws11.test.com Subnets found (may want to probe here using nmap or unicornscan): 208.112.2.0-255 : 1 hostnames found. 66.241.194.0-255 : 2 hostnames found. 76.12.20.0-255 : 1 hostnames found. Done with Fierce scan: http://ha.ckers.org/fierce/ Found 4 entries. Have a nice day. Recon-ng $ recon-ng -w example.com [recon-ng][example.com] > add domains example.com [recon-ng][example.com] > use recon/domains-hosts/brute_hosts [recon-ng][example.com][brute_hosts] > run ----------- EXAMPLE.COM ----------- [*] No Wildcard DNS entry found. [*] 0.example.com => No record found. [*] 01.example.com => No record found. ------- SUMMARY ------- [*] 1 total (1 new) hosts found. [recon-ng][test.com][brute_hosts] > show hosts +----------------------------------------------------------------------------------------------+ | rowid | host | ip_address | region | country | latitude | longitude | module | +----------------------------------------------------------------------------------------------+ | 1 | www.example.com | | | | | | brute_hosts | +----------------------------------------------------------------------------------------------+ [*] 1 rows returned Metasploit $ msfconsole msf> use auxiliary/gather/enum_dns msf auxiliary(enum_dns) > set domain test.org domain => test.org msf auxiliary(enum_dns) > run [*] This domain has wildcards enabled!! [*] Wildcard IP for 2565.test.org is: 217.145.99.169 [*] Setting DNS Server to test.org NS: 217.145.97.43 [*] Retrieving general DNS records [*] Domain: test.org IP address: 217.145.96.131 Record: A [*] Start of Authority: ns0.tmt.de. IP address: 217.145.97.43 Record: SOA [*] Name Server: ns1.tmt.de. IP address: 217.145.96.133 Record: NS [*] Name Server: ns3.tmt.de. IP address: 217.145.98.42 Record: NS [*] Name Server: ns0.tmt.de. IP address: 217.145.97.43 Record: NS [*] Name Server: ns4.tmt.de. IP address: 217.145.99.3 Record: NS [*] Name Server: ns2.tmt.de. IP address: 217.145.98.52 Record: NS [*] Name: git.tmt.de. Preference: 5 Record: MX [*] Name: ubique.maisel.de. Preference: 10 Record: MX [*] Running bruteforce against domain test.org [*] Hostname: 01.test.org IP address: 217.145.99.169 [*] Hostname: 02.test.org IP address: 217.145.99.169 [*] Hostname: 03.test.org IP address: 217.145.99.169 Dnsmap $ dnsmap test.com dnsmap 0.30 - DNS Network Mapper by pagvac (gnucitizen.org) [+] warning: domain might use wildcards. 192.99.166.230 will be ignored from results [+] searching (sub)domains for test.com using built-in wordlist [+] using maximum random delay of 10 millisecond(s) between requests mail.test.com IP address #1: 208.112.2.147 Linux April 2015 DNS_bruteforce(1) [noise@unvalidatedinput]$ ∎