Pat's Crochet Palace 1

My Palace on the web to give my opinions on what ever is on my mind, share my love for crochet and hopefully communicate with like minded people or any one for that matter.

Monday, April 20, 2020

DNSProbe - A Tool Built On Top Of Retryabledns That Allows You To Perform Multiple DNS Queries Of Your Choice With A List Of User Supplied Resolvers


DNSProbe is a tool built on top of retryabledns that allows you to perform multiple dns queries of your choice with a list of user supplied resolvers.

Features
  • Simple and Handy utility to query DNS records.

Usage
dnsprobe -h
This will display help for the tool. Here are all the switches it supports.
FlagDescriptionExample
-cMax dns retries (default 1)dnsprobe -c 5
-lList of dns domains (optional)dnsprobe -l domains.txt
-rRequest Type A, NS, CNAME, SOA, PTR, MX, TXT, AAAA (default "A")dnsprobe -r A
-sList of resolvers (optional)dnsprobe -s resolvers.txt
-tNumber of concurrent requests to make (default 250)dnsprobe -t 500
-fOutput type: ip, domain, response, simple (domain + ip, default), full (domain + response), json (domain + raw response)dnsprobe -f json
-oOutput file (optional)dnsprobe -o result.txt

Installation Instructions

From Source
dnsprobe requires go1.13+ to install successfully. Run the following command to get the repo -
GO111MODULE=on go get -u -v github.com/projectdiscovery/dnsprobe  
In order to update the tool, you can use -u flag with go get command.

Querying host for A record
To query a list of domains, you can pass the list via stdin.
GO111MODULE=on go get -u -v github.com/projectdiscovery/dnsprobe

Querying host for CNAME record
> cat domains.txt | dnsprobe

root@test:~# cat bc.txt | dnsprobe
bounce.bugcrowd.com 192.28.152.174
blog.bugcrowd.com 104.20.4.239
blog.bugcrowd.com 104.20.5.239
www.bugcrowd.com 104.20.5.239
www.bugcrowd.com 104.20.4.239
events.bugcrowd.com 54.84.134.174
This will run the tool against domains in domains.txt and returns the results. The tool uses the resolvers specified with -s option to perform the queries or default system resolvers.

Querying CNAME records on the Subfinder output
> dnsprobe -l domains.txt -r CNAME

root@test:~# dnsprobe -l bc.txt -r CNAME
forum.bugcrowd.com bugcrowd.hosted-by-discourse.com.
collateral.bugcrowd.com bugcrowd.outrch.com.
go.bugcrowd.com mkto-ab270028.com.
ww2.bugcrowd.com bugcrowdinc.mktoweb.com.
researcherdocs.bugcrowd.com ssl.readmessl.com.
docs.bugcrowd.com ssl.readmessl.com.

License
DNSProbe is made with love by the projectdiscovery team.




via KitPloit
Related word

  1. Hacker Tools Github
  2. Hack Rom Tools
  3. Underground Hacker Sites
  4. Bluetooth Hacking Tools Kali
  5. Hacker
  6. Hacking Tools For Mac
  7. Beginner Hacker Tools
  8. Pentest Tools Online
  9. Hack Tool Apk
  10. Best Pentesting Tools 2018
  11. Pentest Tools Apk
  12. Pentest Tools Website
  13. Usb Pentest Tools
  14. Hack Tools For Windows
  15. Hack Tools Pc
  16. Hack Tools For Mac
  17. Ethical Hacker Tools
  18. Hack Tools For Pc
  19. Hacker Tools Apk
  20. Pentest Tools Nmap
  21. New Hack Tools
  22. Pentest Tools Github
  23. Pentest Tools Bluekeep

0 Comments:

Post a Comment

<< Home