{"id":1544,"date":"2009-03-17T09:28:35","date_gmt":"2009-03-17T09:28:35","guid":{"rendered":"https:\/\/www.darknet.org.uk\/?p=1544"},"modified":"2015-09-09T19:38:59","modified_gmt":"2015-09-09T11:38:59","slug":"dnsmap-022-released-subdomain-bruteforcing-tool","status":"publish","type":"post","link":"https:\/\/www.darknet.org.uk\/2009\/03\/dnsmap-022-released-subdomain-bruteforcing-tool\/","title":{"rendered":"dnsmap 0.22 Released – Subdomain Bruteforcing Tool"},"content":{"rendered":"

[ad]<\/p>\n

dnsmap is a subdomain bruteforcer for stealth enumeration, you could say something similar to Reverse Raider<\/a> or DNSenum<\/a>.<\/p>\n

Originally released in 2006, dnsmap is mainly meant to be used by pentesters during the information gathering\/enumeration phase of infrastructure security assessments. During the enumeration stage, the security consultant would typically discover the target company\u2019s IP netblocks, domain names, phone numbers, etc. dnsmap was included in Backtrack<\/a> 2 and 3, although the version included is the now dated version 0.1.<\/p>\n

Subdomain brute-forcing is another technique that should be used in the enumeration stage, as it\u2019s especially useful when other domain enumeration techniques such as zone transfers don\u2019t work (public zone transfers rarely work nowadays).<\/p>\n

Original Features of Version 0.1<\/strong><\/p>\n