首页| JavaScript| HTML/CSS| Matlab| PHP| Python| Java| C/C++/VC++| C#| ASP| 其他|
购买积分 购买会员 激活码充值

您现在的位置是:虫虫源码 > 其他 > 被动DNS网络映射又名子域bruteforcer

被动DNS网络映射又名子域bruteforcer

资 源 简 介

dnsmap was originally released back in 2006 and was inspired by the fictional story "The Thief No One Saw" by Paul Craig, which can be found in the book "Stealing the Network - How to 0wn the Box". dnsmap is mainly meant to be used by pentesters during the information gathering/enumeration phase of infrastructure security assessments. During the enumeration stage, the security consultant would typically discover the target company"s IP netblocks, domain names, phone numbers, etc ... Subdomain brute-forcing is another technique that should be used in the enumeration stage, as it"s especially useful when other domain enumeration techniques such as zone transfers don"t work (I rarely see zone transfers being publicly allowed these days by the way). If you are interested in researching stealth computer intrusion techniques, I suggest reading this excellent (and fun) chapter wh

文 件 列 表

dnsmap-0.30
wordlist_TLAs.txt
use_cases.txt
TODO.txt
README.txt
Makefile
gpl-2.0.txt
dnsmap-bulk.sh
dnsmap.h
dnsmap.c
CREDITS.txt
Changelog.txt
VIP VIP
0.353875s