fierce

DESCRIPTION: fierce is a semi-lightweight count scanner that helps entrance analyzers find noncontiguous IP space and hostnames for a predefined areas utilizing things like DNS, Who is and ARIN. It’s truly implied as a pre-cursor to dynamic testing instruments by means of something like: nmap, unicornscan, nessus, nikto, and so on, since those necessitate that you definitely know what IP space you are searching for. Wild doesn’t perform abuse and doesn’t filter the entire web aimlessly. It is implied explicitly to find probably targets both inside and outside a corporate organization.

Since it utilizes DNS basically you will regularly find mis-arranged organizations that release inward location space.

USAGE: savage {target options} [OPTIONS]

EXAMPLE: wild – dns company.com (Standard Fierce output)

EXAMPLE: wild – dns company.com – wide (Standard Fierce output and search all class c reaches found for PTR names that match the space)

EXAMPLE: wild – dns company.com – just zt (Fierce output that main checks for zone move)

EXAMPLE: savage – dns company.com – ztstop (Fierce output that doesn’t perform bruteforcing in case a zone move is found)

EXAMPLE: furious – dns company.com – wildcstop (Fierce output that doesn’t perform bruteforcing if a special case is found)

Leave a Reply

Prev
dnsmap

dnsmap

DESCRIPTION: The instrument empowers to find all subdomains related to a

Next
DMitry

DMitry

DESCRIPTION: DMitry can assemble however much data as could be expected

You May Also Like