The latest kali fierce

description:

  A DNS scanner can help locate discontinuous IP spaces and host names based on specified domains.
  Fierce is a semi-lightweight scanner that can help you locate discontinuous IP spaces and hostnames based on specified domains. In fact, this is the pioneer of nmap, OpenVAS, nikto, etc., because all of these require you to already know the IP space you are looking for. This will not take advantage of, nor will it scan the entire Internet indiscriminately. It is specifically used to locate possible targets inside and outside the company network. Because it mainly uses DNS, you will often find that a misconfigured network leaks internal address space. This is especially useful in targeted malware. Originally written by RSnake and others on http://ha.ckers.org/. This is just a conversion to Python 3 to simplify and update the code base.

Options:

-h,--help
	显示帮助信息并退出

--domain DOMAIN
	要测试的域名

--connect
	尝试通过HTTP连接到非RFC 1918主机

--wide
	扫描发现的记录的整个c类

--traverse TRAVERSE
	扫描发现记录附近的IP,这不会进入相邻的c类

--search SEARCH [SEARCH …]
	扩展查找时在这些域上进行过滤

--range RANGE
	扫描内部IP范围,使用cidr表示法

--delay DELAY
	在两次查询之间等待的时间

--subdomains SUBDOMAINS [SUBDOMAINS …]
	使用这些子域

--subdomain-file SUBDOMAIN_FILE
	使用此文件中指定的子域(每行一个)

--dns-servers DNS_SERVERS [DNS_SERVERS …]
	使用这些DNS服务器进行反向查找

--dns-file DNS_FILE
	使用此文件中指定的dns服务器进行反向查找(每行一个)

--tcp
	使用TCP代替UDP

Guess you like

Origin blog.csdn.net/qq_40399982/article/details/112903337