Thursday, 13 February 2014

DNSMap Tutorial

DNSMap Tutorial

DNSMap Tutorial

This tutorial will show you how to use DNSMap




Background: Dnsmap is a small C based tool that perform brute-forcing of domains. The tool can use an internal wordlist, or work with an external dictionary file.
Info: http://ikwt.dyndns.org/ This site seems to be down.
(Source http://backtrack.offensive-security....p/Tools#dnsmap )

Ok now to acccess the tool go to K Menu | Backtrack | Information Gathering | DNS| DNSMap




Ok it will open a shell and show you

===========================
Code:
dnsmap - DNS Network Mapper by pagvac
(http://ikwt.com, http://foro.elhacker.net)
Usage: dnsmap <target-domain> [dictionary-file]
Examples:
dnsmap yourtarget.com
dnsmap yourtarget.com yourwordlist.txt

bt dnsmap #
==================================================



Once you have it open you can check the readme by doing a nano README This will provide lots more info.
Be sure to read it there are some limitations when using this tool.

Next we need to give dnsmap a target to search again we will use http://www.victimluser.com
so
Code:
=====================
bt dnsmap # victimluser.com

=========================================


This will return us with:


Code:
==========================
dnsmap - DNS Network Mapper by pagvac
(http://ikwt.com, http://foro.elhacker.net)
Searching subhosts on domain victimluser.com

forum.victimluser.com
IP Address #1:192.168.1.1

mail.victimluser.com
IP Address #1:192.168.1.2

ftp.victimluser.com
IP Address #1:192.168.1.3

pop.victimluser.org
IP Address #1:192.168.1.4


==========================

Also you can create a wordlist.txt that you can supply at the command line like this
Code:
================================
 bt dnsmap # dnsmap targetdomain.com wordlist.txt

=============================================================

This will force dnsmap to use a supplied wordlist to bruteforce subdomains if you do not supply a wordlist then dnsmap
will use the built in one by default.

The readme also give links to a few wordlist you can download.

Have fun using this tool!




Related Posts:

  • Exploiting OpenSSL-Heartbleed Detecting OpenSSL-Heartbleed with Nmap & Exploiting with Metasploit You can now quickly detect the OpenSSL-Heartbleed vulnerability very quickly on a network using the ever popular nmap command, and with the lat… Read More
  • DNSMap Tutorial DNSMap Tutorial DNSMap Tutorial This tutorial will show you how to use DNSMap Background: Dnsmap is a small C based tool that perform brute-forcing of domains. The tool can use an int… Read More
  • Nmap Commands Top 30 Nmap Command Examples For Sys/Network Admins Nmap is short for Network Mapper. It is an open source security tool for network exploration, security scanning and auditing. However, nmap command comes with lots of… Read More
  • Skipfish [kali linux] welcome!Today we are going to see about a tool in skipfish.skipfish is a tool in kali linux to gather information.Skipfish is a web application security Reconnaissance tool. Skipfish prepares an  interactive sitemap for… Read More
  • Heartbleed Vulnerability exploitation Hi HACKERS, In recent weeks, the Heartbleed vulnerability of OpenSSL has been dominating the information security headlines. This vulnerability enables an attacker to extract data from the server's memory that ma… Read More

0 comments:

Post a Comment