Provided by: dnsenum_1.3.2-1_all bug

NAME

       dnsenum -- multithread script to enumerate information on a domain and to discover
       non-contiguous IP blocks

VERSION

       dnsenum version 1.3.1

SYNOPSIS

       dnsenum [options] <domain> -f dns.txt

DESCRIPTION

       Supported operations: nslookup, zonetransfer, google scraping, domain brute force (support
       also recursion), whois ip and reverse lookups.

       Operations:

       •    1) Get the host's address (A record).

       •    2) Get the nameservers (threaded).

       •    3) Get the MX record (threaded).

       •    4) Perform AXFR queries on nameservers (threaded).

       •    5) Get extra names and subdomains via google scraping (google query = "-www
            site:domain").

       •    6) Brute force subdomains from  (REQUIRED), can also perform recursion on subdomain
            that have NS records (all threaded).

       •    7) Calculate Class C IP network ranges from the results and perform whois queries on
            them (threaded).

       •    8) Perform reverse lookups on netranges (class C or/and whois netranges)(threaded).

       •    9) Write to domain_ips.txt file non-contiguous ip-blocks results.

OPTIONS

       The brute force -f switch takes priority over default dns.txt

   GENERAL OPTIONS:
           --dnsserver <server>          Use this DNS server to perform all A, NS and MX queries,
                                          the AXFR and PTR queries are sent to the domain's NS
                                         servers.

           --enum                        Shortcut option equivalent to --threads 5 -s 20 -w.

           -h,  --help                   Print the help message.

           --noreverse                   Skip the reverse lookup operations.
                                          Reverse lookups can take long time on big netranges.

           --nocolor                     Disable ANSIColor output.
                                          This option is only intended to be used on consoles
                                         that do not support
                                          color output.

           --private                     Show and save private ips at the end of the file
                                         domain_ips.txt.

           --subfile <file>              Write all valid subdomains to this file.
                                          Subdomains are taken from NS and MX records,
                                         zonetransfer,
                                          google scraping, brute force and reverse lookup
                                         hostnames.

           -t,  --timeout <value>        The tcp and udp timeout values in seconds (default:
                                         10s).

           --threads <va>                The number of threads that will perform different
                                         queries.

           -v,  --verbose                Be verbose (show all the progress and all the error
                                         messages).

          Notes: neither the default domain nor the resolver search list are appended to domains
          that don't contain any dots.

   GOOGLE SCRAPING OPTIONS:
          This function will scrap subdomains from google search, using query: -www site:domain.

           -p,  --pages <value>          The number of google search pages to process when
                                         scraping names,
                                          the -s switch must be specified, (default: 20 pages).

           -s,  --scrap <value>          The maximum number of subdomains that will be scraped
                                         from google.

          NOTES: Google can block our queries with the malware detection.  Http proxy options for
          google scraping are automatically loaded from the environment if the vars http_proxy or
          HTTP_PROXY are present.  "http_proxy=http://127.0.0.1:8118/" or
          "HTTP_PROXY=http://127.0.0.1:8118/".  On IO errors the mechanize browser object will
          automatically call die.

   BRUTE FORCE OPTIONS:
           -f,  --file <file>            Read subdomains from this file to perform brute force.

           -u,  --update <a|g|r|z>       Update the file specified with the -f switch with valid
                                         subdomains.

                                          -u a      Update using all results.

                                          -u g      Update using only google scraping results.

                                          -u r      Update using only reverse lookup results.

                                          -u z      Update using only zonetransfer results.

           -r,  --recursion              Recursion on subdomains, brute force all discovered
                                         subdomains
                                          that have an NS record.

          NOTES: To perform recursion first we must check previous subdomains results
          (zonetransfer, google scraping and brute force) for NS records after that we perform
          brute force on valid subdomains that have NS records and so on. NS, MX and reverse
          lookup results are not concerned.

   WHOIS IP OPTIONS:
       Perform whois ip queries on c class netanges discovered from previous operations.

           -d,  --delay <value>          The maximum value of seconds to wait between whois
                                         queries,
                                          the value is defined randomly, (default: 3s).

          NOTES: whois servers will limit the number of connections.

           -w,  --whois                  Perform the whois queries on c class network ranges.
                                          Warning: this can generate very large netranges and it
                                          will take lot of time to perform reverse lookups.

          NOTES: The whois query should recursively query the various whois providers until it
          gets the more detailed information including either TechPhone or OrgTechPhone by
          default. See: perldoc Net::Whois::IP.  On errors the netrange will be a default c class
          /24.

   REVERSE LOOKUP OPTIONS:
           -e,  --exclude <regexp>       Exclude PTR records that match the regexp expression
                                         from reverse
                                          lookup results, useful on invalid hostnames.

          NOTES: PTR records that not match the domain are also excluded.  Verbose mode will show
          all results.

OUTPUT FILES

       Final non-contiguous ip blocks are written to domain_ips.txt file.

       NOTES: Final non-contiguous ip blocks are calculated :

       •    1) From reverse lookups that were performed on netranges ( c class network ranges or
            whois netranges ).

       •    2) If the noreverse switch is used then they are calculated from previous operations
            results (nslookups, zonetransfers, google scraping and brute forcing).

README

       dnsenum: multithread script to enumerate information on a domain and to discover non-
       contiguous ip blocks.

PREREQUISITES

       Modules that are included in perl 5.28.0:
         Getopt::Long, IO::File, Thread::Queue.

       Other Necessary modules:
         Must have: Net::DNS, Net::IP, Net::Netmask.
         Optional: Net::Whois::IP, HTML::Parser, WWW::Mechanize.

       Perl ithreads modules (perl must be compiled with ithreads support):
         threads, threads::shared.

AUTHORS

       Filip Waeytens <filip.waeytens[at]gmail.com>

       tix tixxDZ     <tixxdz[at]gmail.com>

MAINTAINER

       Network Silence

COPYRIGHT

       This program is free software; you can redistribute it and/or modify it under the terms of
       the GNU General Public License as published by the Free Software Foundation; either
       version 2 of the License, or (at your option) any later version.

SCRIPT CATEGORIES

       Networking DNS