DNS Information Collection of Information Collection--fierce

Keywords: DNS network

Links to the original text: https://blog.51cto.com/executer/2106151

Catalog

  1. Tool description
  2. Parameter interpretation
  3. Blasting subdomain name
  4. Custom dictionary exploding subdomain name
  5. Inverse the IP segment of the specified range
  6. Inversely Check IP Sections Near Designated Domain Names
  7. Check the C segment IP where the specified domain name is located
  8. Scan optimization: custom timeout, multithreading

Tool description

Fierce is a DNS tool for IP and domain name mutual search. It can detect vulnerabilities in domain transfer, explode sub-domain names in dictionaries, check IP segments, and check IP segments of designated domain names. It belongs to a semi-lightweight multi-threaded information collection tool. Fierce can try to establish an HTTP connection to determine whether a subdomain exists. This function is non-lightweight, so it is defined as semi-lightweight.

Parameter interpretation

# fierce (C) Copywrite 2006,2007 - By RSnake at http://ha.ckers.org/fierce/
# Use commands: fierce [-dns example.com] [OPTIONS]
Options:
        -connect [header.txt]         Right or wrong RFC1918 Address processing HTTP Connection (time-consuming, high traffic), default return to the server response header. Can be specified by file HTTP Requesting header Host Information such as: fierce -dns example.com -connect headers.txt
        -delay <number>              Specify the time interval between two queries
        -dns <domain>                 Specify the domain name for the query
        -dnsfile <dnsfile.txt>         Specify the reverse query with a file DNS Server List
        -dnsserver <dnsserver>   Specify to initialize SOA Inquiring DNS The server. (For initialization only, subsequent queries will use the target's DNS Server)
        -file <domain.txt>              Output the results to a file
        -fulloutput                         And-connect Combined, output all the information returned by the server
        -help                                 print the help information
        -nopattern                        Search mode is not applicable to find hosts. (This parameter is not clear for the time being)
        -range <1.1.1.1/24>         Internally IP Scope to do IP Reverse checking(This parameter is not yet clear). Must and dnsserver Parameter fit, specify interior DNS Servers, such as: fierce -range 111.222.333.0-255 -dnsserver ns1.example.com
        -search <Search list>       Specify other domains and find them in other domains (this parameter is not clear), such as:   fierce -dns examplecompany.com -search corpcompany,blahcompany
        -tcptimeout <number>      Specifies the timeout time of the query
        -threads [number]            Specify the number of threads scanned, default single thread
        -traverse [number]           The top and bottom of the specified scan IP Scope, Default scan up and down 5 each.
        -version                           Printing fierce Edition
        -wide                               Scan entry IP Address C Paragraph. Generate large traffic and gather more information.
        -wordlist <sub.txt>          Subdomain name explosion using specified dictionary

# The data in [] is optional and <> is mandatory.

Blasting subdomain name

# Specify the domain name to be scanned by dns parameters
root@owefsadfikls:/# fierce -dns ziroom.com
# In turn, fierce acquires DNS servers for specified domains, checks for transmission vulnerabilities in DNS domains, checks for pan-domain resolution, and explodes sub-domains with dictionaries, as shown below.

Custom dictionary exploding subdomain name

# Specify dictionaries through wordlist
# The prefix of the domain name in the dictionary file, such as admin.ziroom.com, is admin.
root@owefsadfikls:/tmp# fierce -dns ziroom.com -wordlist subziroom.txt

Inversely Check IP Sections Near Designated Domain Names

# Scanning the IP range of the specified domain name through traverse
root@owefsadfikls:/tmp# fierce -dns ziroom.com -traverse

Check Section C of the Designated Domain Name

# Query the host name information of the C segment where the domain name is located by wide
root@owefsadfikls:/tmp# fierce -dns ziroom.com -wide

Scan optimization: multithreading, custom timeout

# Through threads, tcptimeout and delay, scanning can be tuned. Specific parameters vary with different machine and network conditions

Posted by Kitkat on Sat, 05 Oct 2019 15:13:36 -0700