Skip to content

Latest commit

 

History

History
106 lines (88 loc) · 4.66 KB

README.md

File metadata and controls

106 lines (88 loc) · 4.66 KB

##Version 0.7.8

###Date: 7/8/12 ###Changes:

  • CSV file now have a proper header for better parsing on tools that support them like Excel and PowerShell.
  • Windows System Console printing is now managed properly.
  • CNAME Records are now saved in SQLite3 and CSV output. They where only saved on XML output.
  • Fixed error when performing Zone Transfers do to improper indent.
  • Fixed misslabling of -c option in the help message.
  • If a Range or CIDR is given and no scan type is given it will perform a Reverse Look up against it. When other types are given rvl type will be appended to the list automaticaly.
  • Improved NSEC Type detection so as to eliminate possible false positive.
  • Added processing of LOC, NAPTR, CERT and RP records of zone transfers returned. Proper information saved on XML output with proper field names in the attributes for these.
  • Fixes on google enumeration parsing.
  • Fixed several typos.
  • Better handling and canceling of threaded tasks.

##Version 0.7.3

###Date: 5/2/12 ###Changes:

  • Fixes for Python3 compatibility.
  • fix key values for when saving results to XML and CSV.

##Version 0.7.0

###Date: 3/2/12 ###Changes:

  • Fixes to Zone Walk option.
  • Query for _domainkey record in standard enumeration.

##Version 0.6.8

###Date: 2/15/12 ###Changes:

  • Added tool folder with python script for parsing results in XML and CSV format. Provide ability to filter and extract hostnames and subdomains.

  • Added Metasploit Plugin for importing in to metasploit the CSV and XML results in a very fast manner using Nokogiri for XML, it ill add hosts, notes for hostnames and service entries. -Improvements on the zone transfer code:

    • Handling of zones with no NS Records.
    • Proper parsing of PTR Records in returned zones.
    • De-duplication of NS record IP Addresses.
    • Provide additional info on failure.
    • Provide more infomation on actions being taken.
  • Bug fixes reported by users at RandomStorm and by Robin Wood.

  • Zone Walking has been greatly improved including the accuracy of the results and the formatting to extract the information in a manner more useful for a pentester.

##Version 0.6.6

###Date: 1/20/12 ###Changes:

  • Does not for a Origin Check for zones transferred since some admin may have configured their zones without NS Servers as experienced by a user.
  • Handles exception if NS records cannot be resolved when performing a zone transfer test.
  • Will always for a test for the SOA and test it for zone transfer.
  • Fixed problem when generating an XML from a zone transfer with the new parsing method, info type was added to the XML output.

##Version 0.6.5 ###Date: 1/16/12 ###Changes:

  • Fixed problem with get_ns.
  • Python 3.2 support.
  • Color printing of messages like Metasploit.
  • New library for printing color messages.
  • Improved parsing of records when it is a zone transfer.

##Version 0.6.1 ###Date: 1/14/12 ###Changes:

  • IPv6 support for ranges in reverse look-up.
  • Enhanced parsing of SPF records ranges to cover includes and IPv6.
  • Specific host query for TXT RR.
  • Better handling and logging of TXT and SPF RR.
  • Started changes for Python 3.x compatibility.
  • Filtering of wild-card records when saving brute-force results.
  • Show found records after brute-force of domains is finished.
  • Manage Ctrl-C when doing a brute-force and save results for those records found.
  • Corrected several spelling errors.

##Version 0.6 ###Date: 1/11/12 ###Changes:

  • Removed mDNS enumeration do to that the pybonjour library has been abandoned and faster ways are available to achieve enumeration of mDNS records in a sub-net.
  • Removed un-used variables.
  • Applied changes for PEP8 compliance.
  • Added comma delimited value to a file for the results.

##Version 0.5.1 ###Date: 1/8/12 ###Changes:

  • Additional fixes for XML formatting.
  • ability to end a zone walk with control-c and not lose data.
  • Initial Metasploit plug-in to be able to import data from XML file generated by dnsrecon.

##Version 0.5 ###Date: 1/8/12 ###Changes:

  • Will check in standard enumeration is DNSSEC is configured for the zone by checking for DNSKEY Records and checking is the zone is configured as NSEC or NSEC3.
  • With the get_ip() method it will also check for CNAME records and add those to the list found hosts.
  • Will Perform a DNSSEC Zone Walk if NSEC Records are available, it identifies currently A, AAAA, CNAME, NS and SRV records any other it will just print the RDATA info.
  • General record resolver method added.
  • Changes to the options.

Known Issues:

  • For some reason the python getopt is not parsing the options correctly in some cases. Considering changing to optparse even if it is more complicated to manage.
  • When Running on version 3.x of Python the Whois wuery does not show the organization.