From Collaborative RCE Knowledge Library

Jump to: navigation, search

dnsbf.py - Python script for Reverse dns search in a subnet (dns brute force)

Item name: dnsbf.py - Python script for Reverse dns search in a subnet (dns brute force)
Rating: 0.0 (0 votes)
Author: t0ka7a                        
Home URL: http://infond.blogspot.com
Last updated: April 5, 2010
Version (if appl.):
Direct D/L link: http://infond.blogspot.com/2010/02/dnsbfpy-python-script-for-reverse-dns.html
Description: The first step of a penetration test is to discover hosts in a subnet. In this aim, DNS is your second best friend (after Google :).
First, to know which subnet (ex: 72.14.204.0/23) is associated to a hostname (ex: www.google.fr), you can use the Whois database (ex: with a site as http://www.robtex.com).
Then, to know which hosts are declared in DNS database in this subnet, you can use dnsbf.py :)
dnsbf.py is a script, written in Python, which conducts a Reverse DNS search for all the IPs in a subnet.
Related URLs: No related URLs have been submitted for this item yet


RSS feed Feed containing all updates for this item.

You are welcome to add your own useful notes about this tool, for others to see!



If you find that any information for the item above is missing, outdated or incorrect, please edit it!
(please also edit it if you think it fits well in some additional category, since this can also be controlled)


Views
Category Navigation Tree
   Tools