Search the Community
Showing results for tags 'bluto'.
-
BLUTO DNS Recon | Brute Forcer | DNS Zone Transfer | DNS Wild Card Checks | DNS Wild Card Brute Forcer | Email Enumeration | Staff Enumeration | Compromised Account Enumeration | Metadata Harvesting It has gone through a large code base change and various feature additions have been added since its first day on the job. Now that RandomStorm has been consumed and no longer exists, I felt it time to move the repo to a new location. So from this git push onwards, Bluto will live here. I hope you enjoy the new Bluto. The target domain is queried for MX and NS records. Sub-domains are passively gathered via Netcraft. The target domain NS records are each queried for potential Zone Transfers. If none of them gives up their spinach, Bluto will attempt to identify if SubDomain Wild Cards are being used. If they are not Bluto will brute force subdomains using parallel sub-processing on the top 20000 of the ‘The Alexa Top 1 Million subdomains’ If Wild Cards are in place, Bluto will still Brute Force SubDomains but using a different technique which takes roughly 4 x longer. Netcraft results are then presented individually and are then compared to the brute force results, any duplications are removed and particularly interesting results are highlighted. Changelog v2.4.16 PDFminer Version set – bug fix [HIDE][Hidden Content]]