Metasploit mailing list archives
Re: errors using dns_enum
From: Chris Calaf <thelab13 () gmail com>
Date: Fri, 20 Nov 2009 20:25:02 -0500
osx: msf auxiliary(dns_enum) > ruby -v [*] exec: ruby -v ruby 1.8.7 (2009-06-12 patchlevel 174) [i686-darwin10] msf auxiliary(dns_enum) > info Name: DNS Enumeration Module Version: $Rev: 7500 License: Metasploit Framework License (BSD) Provided by: Carlos Perez <carlos_perez () darkoperator com> Basic options: Name Current Setting Required Description ---- --------------- -------- ----------- DOMAIN google.com yes The target domain name ENUM_AXFR false yes Initiate a zone Transfer against each NS record ENUM_BRT false yes Brute force subdomains and hostnames via wordlist ENUM_RVL false yes Reverse lookup a range of IP addresses ENUM_SRV true yes Enumerate the most common SRV records ENUM_STD true yes Enumerate standard record types (A,MX,NS,TXT and SOA) ENUM_TLD false yes Perform a top-level domain expansion by replacing TLD and testing against IANA TLD list IPRANGE no The target address range or CIDR identifier NS no Specify the nameserver to use for queries, otherwise use the system DNS STOP_WLDCRD false yes Stops Brute Force Enumeration if wildcard resolution is detected WORDLIST /Users/lab13/tools/metasploit3/data/wordlists/namelist.txt no Wordlist file for domain name brute force. backtrack4: msf auxiliary(dns_enum) > ruby -v [*] exec: ruby -v ruby 1.8.7 (2008-08-11 patchlevel 72) [i486-linux] msf auxiliary(dns_enum) > info Name: DNS Enumeration Module Version: $Rev: 7500 License: Metasploit Framework License (BSD) Provided by: Carlos Perez <carlos_perez () darkoperator com> Basic options: Name Current Setting Required Description ---- --------------- -------- ----------- DOMAIN google.com yes The target domain name ENUM_AXFR false yes Initiate a zone Transfer against each NS record ENUM_BRT false yes Brute force subdomains and hostnames via wordlist ENUM_RVL false yes Reverse lookup a range of IP addresses ENUM_SRV true yes Enumerate the most common SRV records ENUM_STD true yes Enumerate standard record types (A,MX,NS,TXT and SOA) ENUM_TLD false yes Perform a top-level domain expansion by replacing TLD and testing against IANA TLD list IPRANGE no The target address range or CIDR identifier NS no Specify the nameserver to use for queries, otherwise use the system DNS STOP_WLDCRD false yes Stops Brute Force Enumeration if wildcard resolution is detected WORDLIST /pentest/exploits/framework3/data/wordlists/namelist.txt no Wordlist file for domain name brute force. On Fri, Nov 20, 2009 at 8:25 AM, Carlos Perez <carlos_perez () darkoperator com
wrote:
I was not able to replicate the error on my test systems can you send me a ruby -v on each system and the domain and options so as to replicate it better Sent from my Mobile Phone On Nov 20, 2009, at 9:10 AM, Chris Calaf <thelab13 () gmail com> wrote: Apologies for the double post but first one did not hit the list. I'm getting the following error when trying to use dns_enum on both BT4 and Snow Leopard. I installed the macports version of net-dns. Should I be installing it via CPAN or some ruby port? Using ruby 1.9 =[ metasploit v3.4-dev [core:3.4 api:1.0] + -- --=[ 448 exploits - 216 auxiliary + -- --=[ 192 payloads - 22 encoders - 8 nops =[ svn r7568 updated today (2009.11.18) msf > use auxiliary/gather/dns_enum msf auxiliary(dns_enum) > set DOMAIN <http://somedomain.com/> somedomain.com DOMAIN => <http://somedomain.com/>somedomain.com msf auxiliary(dns_enum) > run [-] Auxiliary failed: NameError /Users/user/tools/metasploit3/ data/msfweb/vendor/rails/activesupport/lib/active_support/dependencies.rb:105:in `const_missing': uninitialized constant Net::DNS::RR::OPT [-] Call stack: [-] /Users/user/tools/metasploit3/lib/net/dns/rr.rb:325:in `new_from_binary' [-] (eval):1:in `new_from_binary' [-] /Users/user/tools/metasploit3/lib/net/dns/rr.rb:175:in `eval' [-] /Users/user/tools/metasploit3/lib/net/dns/rr.rb:325:in `new_from_binary' [-] /Users/user/tools/metasploit3/lib/net/dns/rr.rb:175:in `send' [-] /Users/user/tools/metasploit3/lib/net/dns/rr.rb:175:in `parse_packet' [-] /Users/user/tools/metasploit3/lib/net/dns/packet.rb:546:in `new_from_data' [-] /Users/user/tools/metasploit3/lib/net/dns/packet.rb:545:in `times' [-] /Users/user/tools/metasploit3/lib/net/dns/packet.rb:545:in `new_from_data' [-] /Users/user/tools/metasploit3/lib/net/dns/packet.rb:152:in `send' [-] /Users/user/tools/metasploit3/lib/net/dns/packet.rb:152:in `parse' [-] /Users/user/tools/metasploit3/lib/net/dns/resolver.rb:979:in `send' [-] /Users/user/tools/metasploit3/lib/net/dns/resolver.rb:890:in `query' [-] (eval):59:in `switchdns' [-] (eval):423:in `run' [*] Auxiliary module execut _______________________________________________ https://mail.metasploit.com/mailman/listinfo/framework
_______________________________________________ https://mail.metasploit.com/mailman/listinfo/framework
Current thread:
- errors using dns_enum thelab13 (Nov 19)
- <Possible follow-ups>
- errors using dns_enum Chris Calaf (Nov 20)
- Re: errors using dns_enum Carlos Perez (Nov 20)
- Re: errors using dns_enum Chris Calaf (Nov 20)
- Re: errors using dns_enum Chris Calaf (Nov 23)
- Re: errors using dns_enum Carlos Perez (Nov 23)
- Re: errors using dns_enum Chris Calaf (Nov 23)
- Re: errors using dns_enum Carlos Perez (Nov 20)