A simple and fast sub domain brute tool for pentesters. It can rearch as fast as 1000 DNS queries per second.
这个脚本的主要目标是发现其他工具无法探测到的域名, 如Google,aizhan,fofa。高频扫描每秒DNS请求数可超过1000次。
早期版本参见安全脉搏《subDomainsBrute — 改进渗透测试时暴力枚举子域名的python脚本》
Time performance optimization
Placeholder {alphnum} {alpha} {num} could be used in Names File
First you need to install dnspython to do DNS query
pip install dnspython
Usage: subDomainsBrute.py [options] target.com Options: --version show program's version number and exit -h, --help show this help message and exit --full Full scan, a large NAMES FILE will be used during the scan -i, --ignore-intranet Ignore domains pointed to private IPs -o OUTPUT, --output=OUTPUT Output file name. default is {target}.txt
参数 -t
已经去掉了,想要设定并发线程的数量,请直接修改dict\dns_servers.txt文件中的行数即可。
Output file could be like: https://github.com/lijiejie/subDomainsBrute/blob/master/dict/sample_youku.com_full.txt
【原文:subDomainsBrute 原创作者:LiJieJie my[at]lijiejie.com (Blog) 安全脉搏整理发布】