Bluto is a Python-based tool for DNS recon, DNS zone transfer testing, DNS wild card checks, DNS brute forcing, e-mail enumeration and more.
The target domain is queried for MX and NS records. Sub-domains are passively gathered via NetCraft. The target domain NS records are each queried for potential Zone Transfers. If none of them gives up their spinach, Bluto will attempt to identify if SubDomain Wild Cards are being used.
If they are not Bluto will brute force sub-domains using parallel sub processing on the top 20000 of the ‘The Alexa Top 1 Million subdomains’ If Wild Cards are in place, Bluto will still Brute Force SubDomains but using a different technique which takes roughly 4 x longer.
NetCraft results are then presented individually and are then compared to the brute force results, any duplications are removed and particularly interesting results are highlighted.
Bluto now does email address enumeration based on the target domain, currently using Bing and Google search engines plus gathering data from the Email Hunter service and LinkedIn. https://haveibeenpwned.com/ is then used to identify if any email addresses have been compromised. Previously Bluto produced an ‘Evidence Report’ on the screen, this has now been moved off screen and into an HTML report.
Search engine queries are configured in such a way to use a random
User Agent: on each request and does a country look up to select the fastest Google server in relation to your egress address. Each request closes the connection in an attempt to further avoid captchas, however, excessive lookups will result in captchas (Bluto will warn you if any are identified).
bluto [--domain=<domain>] [-e] [-u] [--timeout=<timeout>] [--api=<key>]
bluto -h | --help
bluto -e Large Subdomain list used for bruteforcing
bluto -u Check for latest version of Bluto
bluto --timeout Set DNS timeout in seconds
bluto --domain Set target domain
bluto --api Set Hunter API key
bluto --help Help menu
bluto --version Current Bluto version
You can download Bluto here:
Or read more here.