DESCRIPTION: fierce is a semi-lightweight count scanner that helps entrance analyzers find noncontiguous IP space and hostnames for a predefined areas utilizing things like DNS, Who is and ARIN. It’s truly implied as a pre-cursor to dynamic testing instruments by means of something like: nmap, unicornscan, nessus, nikto, and so on, since those necessitate that you definitely know what IP space you are searching for. Wild doesn’t perform abuse and doesn’t filter the entire web aimlessly. It is implied explicitly to find probably targets both inside and outside a corporate organization.
Since it utilizes DNS basically you will regularly find mis-arranged organizations that release inward location space.
USAGE: savage {target options} [OPTIONS]
EXAMPLE: wild – dns company.com (Standard Fierce output)
EXAMPLE: wild – dns company.com – wide (Standard Fierce output and search all class c reaches found for PTR names that match the space)
EXAMPLE: wild – dns company.com – just zt (Fierce output that main checks for zone move)
EXAMPLE: savage – dns company.com – ztstop (Fierce output that doesn’t perform bruteforcing in case a zone move is found)
EXAMPLE: furious – dns company.com – wildcstop (Fierce output that doesn’t perform bruteforcing if a special case is found)