Penetration Testing mailing list archives
Re: [PEN-TEST] Recon tool kit part 1
From: Bennett Todd <bet () RAHUL NET>
Date: Fri, 29 Sep 2000 23:29:17 -0400
I've two suggestions. First one, tweak the description a smigeon: you wrote: 2000-09-28-21:32:47 Matt W.:
DNSHoe allows anyone to find out all the host names associated with a range of IPs.
Rather, say "finds all reverse records available for a range of IPs". That's an easy scan; finding all names associated with an IP is impractical; it requires walking the entire DNS tree.
Requires NET::DNS perl module.
and in the code you comment: # Future Improvements # Add multithread support Allow me to recommend you simplify this program. Rather than continuing to extend is functionality and complicate its implementation, simplify. Reduce the program so it does nothing but print all the IPs in the requested range, then pipe that into dnsfilter (part of the djbdns package, from <URL:http://cr.yp.to/djbdns.html>, lots of extra info at <URL:http://djbdns.org/>). This will give you the best performance you can get. For a _huge_ additional performance boost, set up a local caching nameserver running dnscache, also from the djbdns package. -Bennett
Attachment:
_bin
Description:
Current thread:
- [PEN-TEST] Recon tool kit part 1 Matt W. (Sep 28)
- Re: [PEN-TEST] Recon tool kit part 1 H D Moore (Sep 29)
- Re: [PEN-TEST] Recon tool kit part 1 edison (Sep 29)
- Re: [PEN-TEST] Recon tool kit part 1 Bennett Todd (Sep 30)