Penetration Testing mailing list archives

Re: [PEN-TEST] Recon tool kit part 1


From: Bennett Todd <bet () RAHUL NET>
Date: Fri, 29 Sep 2000 23:29:17 -0400

I've two suggestions.

First one, tweak the description a smigeon: you wrote:

2000-09-28-21:32:47 Matt W.:
DNSHoe allows anyone to find out all the host names associated
with a range of IPs.

Rather, say "finds all reverse records available for a range of
IPs". That's an easy scan; finding all names associated with an IP
is impractical; it requires walking the entire DNS tree.

Requires NET::DNS perl module.

and in the code you comment:

        # Future Improvements
        # Add multithread support

Allow me to recommend you simplify this program. Rather than
continuing to extend is functionality and complicate its
implementation, simplify. Reduce the program so it does nothing
but print all the IPs in the requested range, then pipe that into
dnsfilter (part of the djbdns package, from
<URL:http://cr.yp.to/djbdns.html>, lots of extra info at
<URL:http://djbdns.org/>). This will give you the best
performance you can get. For a _huge_ additional performance
boost, set up a local caching nameserver running dnscache, also
from the djbdns package.

-Bennett

Attachment: _bin
Description:


Current thread: