Re: dnsdigger

From: Mark Wolfgang (moonpie@moonpie.org)
Date: Mon Jun 16 2003 - 13:25:04 EDT


In regards to my previous post, it sure would have been nice if I provided
the location for my script :( It can be found at http://moonpie.org/tools/bf-dns.tgz

-Mark

On Sun, Jun 15, 2003 at 09:57:21AM +0200 or thereabouts, Michael Thumann wrote:
> We like to annouce that DNSDigger is now available
> from our website:
> www.ernw.de/download/dnsdigger.zip
>
> DNSDigger is a program to gather as much as
> possible informations from DNS Servers. Two
> different methods are used:
>
> 1. DNS Server Query
> Query every DNS Server that is responsible for the
> domain, primary and each secondary. Sometimes
> only one DNS Server is misconfigured, but that could
> be enough to get the whole zone file or a provider DNS
> is used. Some providers allow zone transfers from
> their DNS Servers.
>
> 2. DNS Digging
> The idea is to use the same technique as with password
> attacks based on dictionaries to find hostnames hidden
> in the DNS zone.There's a names.txt which contains the
> dictionary. The option HYBRID will append the nummbers
> 01 to 99 to each entry in the names.txt to uncover
> additional hostnames.
>
> The tools might be useful for all pen-testers that have to
> gather DNS informations during a pen-test.
>
> I hope you will find it as useful as I do ,-)
> cheers
> Michael
>
> ---------------------------------------------------------------------------
> Attend the Black Hat Briefings & Training, July 28 - 31 in Las Vegas, the
> world's premier technical IT security event! 10 tracks, 15 training sessions,
> 1,800 delegates from 30 nations including all of the top experts, from CSO's to
> "underground" security specialists. See for yourself what the buzz is about!
> Early-bird registration ends July 3. This event will sell out. www.blackhat.com
> ----------------------------------------------------------------------------
>
---end quoted text---

-- 
Risk accepted by one is imposed on all
http://moonpie.org




This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:53:34 EDT