Quantcast
Channel: Penetration Test – Security List Network™
Viewing all articles
Browse latest Browse all 1152

Bluto v1.99 – DNS Recon | Brute Forcer | DNS Zone Transfer | DNS Wild Card Checks | DNS Wild Card Brute Forcer | Email Enumeration | Staff Enumeration | Compromised Account Enumeration.

$
0
0

Changelog Latest Version 1.99 (09/07/2016):
+ Email Hunter API Support Added.
+ Haveibeenpwned API Support Added.
+ HTML Evidence Report Added.
+ Modulated Code Base.
+ Local Error Logging.bluto-1-99

The target domain is queried for MX and NS records. Sub-domains are passively gathered via NetCraft. The target domain NS records are each queried for potential Zone Transfers. If none of them gives up their spinach, Bluto will attempt to identify if SubDomain Wild Cards are being used. If they are not Bluto will brute force subdomains using parallel sub processing on the top 20000 of the ‘The Alexa Top 1 Million subdomains’ If Wild Cards are in place, Bluto will still Brute Force SubDomains but using a different technique which takes roughly 4 x longer. NetCraft results are then presented individually and are then compared to the brute force results, any duplications are removed and particularly interesting results are highlighted.

Bluto now does email address enumeration based on the target domain, currently using Bing and Google search engines plus gathering data from the Email Hunter service and LinkedIn. https://haveibeenpwned.com/ is then used to identify if any email addresses have been compromised. Previously Bluto produced a ‘Evidence Report’ on the screen, this has now been moved off screen and into an HTML report.

Search engine queries are configured in such a way to use a random User Agent: on each request and does a country look up to select the fastest Google server in relation to your egress address. Each request closes the connection in an attempt to further avoid captchas, however exsesive lookups will result in captchas (Bluto will warn you if any are identified).

Bluto requires various other dependencies. So to make things as easy as possible, pip is used for the installation. This does mean you will need to have pip installed prior to attempting the Bluto install.

Latest Version Features:
+ DNS recon
+ SubDomain Brute forcer
+ DNZ Zone Transfers
+ DNS Wild Card Checks
+ DNS Wild Card Brute Forcing
+ Email Enumeration
+ Staff Enumeration
+ Compromised Account Enumeration
+ HTML Evidence Report
+ Email Hunter API Support
+ haveibeenpwned.com API Support
+ Fast Geo Aware Google Searches
+ Google Searches
+ Bing Searches
+ LinkedIn Searches

Usage:

pip install git+https://github.com/uqfoundation/pathos.git
sudo pip install git+git://github.com/darryllane/Bluto
bluto

Examples Using API:
Bluto -api 2b0ab19df982a783877a6b59b982fdba4b6c3669
Bluto -E

upgrade:
sudo pip install git+git://github.com/darryllane/Bluto --upgrade

Source: https://github.com/darryllane | Our Post Before


Viewing all articles
Browse latest Browse all 1152

Trending Articles