#subdomain finder python
Explore tagged Tumblr posts
pentesttoolz · 5 years ago
Text
How to Find Subdomains of a Website using Sublist3r
How to Find Subdomains of a Website using Sublist3r #DNSdumpster #Netcraft #Threatcrowd #VirusTotal #BugBounty
[sc name=”ad_1″]
Sublist3r is a python tool designed to enumerate subdomains of websites using OSINT. It helps penetration testers and bug hunters collect and gather subdomains for the domain they are targeting. Sublist3r enumerates subdomains using many search engines such as Google, Yahoo, Bing, Baidu, and Ask. Sublist3r also enumerates subdomains using Netcraft, Virustotal, ThreatCrowd,…
View On WordPress
0 notes
thetechnologyguy-blog1 · 6 years ago
Text
DEVPLOIT – HACKEAR FÁCILMENTE CON ESTE SENCILLO SCRIPT DE PYTHON
Tumblr media
El pentesting se trata de mostrar y reportar problemas en aplicaciones web/móviles. Esta es la parte más popular de la seguridad cibernética que todo investigador o entusiasta de la seguridad quiere hacer, porque da un breve conocimiento de cómo penetrar en cualquier aplicación web. El pentesting se realiza mediante la recopilación de información. Existen muchas herramientas/scripts disponibles en Internet que se pueden usar para recopilar información. Así que hoy venimos con otra herramienta escrita por Joker Security. La herramienta denominada Devploit, que se utiliza en la recopilación de información, y otra herramienta similar, todo en una, es Mercury Tool.
Devploit es una herramienta muy fácil de usar que proporciona información sobre su objetivo. Sólo tiene que ejecutar este script con algunos de los comandos básicos de Linux. Puede recopilar mucha información sobre su objetivo antes de la explotación. Esta herramienta completa la lista de varias herramientas como DNS, Whois IP, Geo IP, Port Scanner y muchas otras herramientas, lo cual es útil en la fase inicial de las pruebas de penetración. A continuación se mostrarán las características de Devploit. Para mostrarle tenemos instalado Devploit en Kali Linux. Hay otras distribuciones de Linux que soportan Devploit, como Ubuntu, Mint y Parrot.
Para clonar, escriba git clone https://github.com/joker25000/Devploit.git
A continuación, escriba cd Devploit
Escriba ls -ltr para verificar los permisos de los archivos que están incluidos en el directorio devploit
root@kali:/home/iicybersecurity/Downloads/Devploit# ls -ltr total 32 -rw-r--r-- 1 root root 1838 Dec 30 23:32 README.md -rw-r--r-- 1 root root 2154 Dec 30 23:32 install -rw-r--r-- 1 root root 8469 Dec 30 23:32 Devploit.py drwxr-xr-x 2 root root 4096 Dec 30 23:32 Dev -rw-r--r-- 1 root root 1990 Dec 30 23:32 update.py drwxr-xr-x 5 root root 4096 Dec 30 23:32 modules
De forma predeterminada, los archivos del instalador de Devploit no vienen con permiso de ejecución, por lo que para cambiar el permiso del archivo de instalación, debe escribir chmod u + x install
Para verificar si el permiso ha cambiado, escriba ls -ltr. Si el permiso ha cambiado, el archivo de instalación se convertirá en color verde
root@kali:/home/iicybersecurity/Downloads/Devploit# chmod u+x install root@kali:/home/iicybersecurity/Downloads/Devploit# ls -ltr total 32 -rw-r--r-- 1 root root 1838 Dec 30 23:32 README.md -rwxr--r-- 1 root root 2154 Dec 30 23:32 install -rw-r--r-- 1 root root 8469 Dec 30 23:32 Devploit.py drwxr-xr-x 2 root root 4096 Dec 30 23:32 Dev -rw-r--r-- 1 root root 1990 Dec 30 23:32 update.py drwxr-xr-x 5 root root 4096 Dec 30 23:32 modules
A continuación, escriba python Devploit.py
root@kali:/home/iicybersecurity/Downloads/Devploit# python Devploit.py
      ,               |'.             , ...  Devploit  -  Information Gathering Tool               |  '-._        / )             .'  .._  ',     /_'-,            '   /  _'.'_\   /._)')           :   /  '_' '_'  /  _.'           |E |   |Q| |Q| /   /          .'  _\  '-' '-'    /        .'--.(S     ,__` )  /              '-.     _.'  /            __.--'----(   /        _.-'     :   __\ /       (      __.' :'  :Y        '.   '._,  :            '.     ) :.__:|            \    \______/             '._L/_H____]
==[[ .:: Name : Devploit ::.]]== ==[[ .:: Version: 3.6 ::.]]== ==[[ .:: Author : Joker-Security ::.]]== ==[[ .:: Github : http://www.github.com/joker25000 ::.]]== ==[[ .:: Twitter: https://twitter.com/SecurityJoker ::.]]==
This Is Simple Script By : Joker-Security  Let's Start  --> --> -->
1 }  ==>  DNS Lookup 2 }  ==>  Whois Lookup 3 }  ==>  GeoIP Lookup 4 }  ==>  Subnet Lookup 5 }  ==>  Port Scanner 6 }  ==>  Extract Links 7 }  ==>  Zone Transfer 8 }  ==>  HTTP Header 9 }  ==>  Host Finder 10}  ==>  IP-Locator 11}  ==>  Traceroute 12}  ==>  Robots.txt 13}  ==>  Host DNS Finder 14}  ==>  Revrse IP Lookup 15}  ==>  Collection Email 16}  ==>  Subdomain Finder 17}  ==>  Install & Update 18}  ==>  About Me 00}  ==>  Exit
Enter 00/18 => =>
Elija cualquier opción en la herramienta que desea utilizar. Luego escriba el número de la herramienta como se muestra a continuación
Obtener DNS del objetivo
Tipo 1
Escriba la URL de destino
Escriba www.hackthissite.org
Enter 00/18 => =>  1 Entre Your Domain :www.hackthissite.org www.hackthissite.org.   3599    IN      A       137.74.187.100 www.hackthissite.org.   3599    IN      A       137.74.187.104 www.hackthissite.org.   3599    IN      A       137.74.187.103 www.hackthissite.org.   3599    IN      A       137.74.187.101 www.hackthissite.org.   3599    IN      A       137.74.187.102 www.hackthissite.org.   3599    IN      AAAA    2001:41d0:8:ccd8:137:74:187:101 www.hackthissite.org.   3599    IN      AAAA    2001:41d0:8:ccd8:137:74:187:103 www.hackthissite.org.   3599    IN      AAAA    2001:41d0:8:ccd8:137:74:187:102 www.hackthissite.org.   3599    IN      AAAA    2001:41d0:8:ccd8:137:74:187:104 www.hackthissite.org.   3599    IN      AAAA    2001:41d0:8:ccd8:137:74:187:100
Como se muestra arriba después de escanear usando DNS Lookup. DNS muestra los registros A y AAA del objetivo. Esta información puede ser utilizada en otras actividades de hacking
Obtener búsqueda de WHOIS par el objetivo
Escriba 2 para la búsqueda whois, que le brinda información básica sobre el objetivo. Muestra el servidor, los datos de actualización, la fecha de caducidad y mucha más información que proporciona whois
Luego escribe hack.me
Enter 00/18 => =>  2 Enter IP Address : hack.me Domain Name: HACK.ME Registry Domain ID: D108500000000003559-AGRS Registrar WHOIS Server: whois.godaddy.com Registrar URL: http://www.godaddy.com Updated Date: 2018-04-30T15:06:34Z Creation Date: 2008-04-29T18:00:32Z Registry Expiry Date: 2021-04-29T18:00:32Z Registrar Registration Expiration Date: Registrar: GoDaddy.com, LLC Registrar IANA ID: 146 Registrar Abuse Contact Email: [email protected] Registrar Abuse Contact Phone: +1.4806242505 Reseller: Domain Status: clientDeleteProhibited https://icann.org/epp#clientDeleteProhibited Domain Status: clientRenewProhibited https://icann.org/epp#clientRenewProhibited Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited Domain Status: clientUpdateProhibited https://icann.org/epp#clientUpdateProhibited Registrant Organization: Domains By Proxy, LLC Registrant State/Province: Arizona Registrant Country: US Name Server: NS5.DNSMADEEASY.COM Name Server: NS6.DNSMADEEASY.COM Name Server: NS7.DNSMADEEASY.COM Name Server: NS4.HACK.ME DNSSEC: unsigned URL of the ICANN Whois Inaccuracy Complaint Form  https://www.icann.org/wicf/) Last update of WHOIS database: 2018-12-31T06:14:27Z <<< For more information on Whois status codes, please visit https://icann.org/epp The Registrar of Record identified in this output may have an RDDS service that can be queried for additional information on how to contact the Registrant, Admin, or Tech contact of the queried domain name.
El comando anterior muestra el servidor del destino. Servidor de nombres, estado del dominio. Registrador de correo electrónico de identificación y número de teléfono
La información anterior se puede utilizar en otras actividades de hacking
Conseguir emails del objetivo
Escriba 15 para la recolección de correos
Escriba hack.me
Enter 00/18 => =>  15 Entre Your Domain :hack.me [>] Initiating 3 intel modules [>] Loading Alpha module (1/3) [>] Beta module deployed (2/3) [>] Gamma module initiated (3/3) [+] Emails found: [email protected] [email protected] [+] Hosts found in search engines: -] Resolving hostnames IPs… 74.50.111.244:me.hack.me [+] Virtual hosts: 74.50.111.244   hack.me 74.50.111.244   hack.me
Arriba se muestran las direcciones de correo electrónico del objetivo. La información anterior se puede utilizar en otras actividades de hacking
Conseguir subdominios del objetivo
Escriba 16 para el buscador de subdominios
Escriba hack.me
Enter 00/18 => =>  16 Entre Your Domain :hack.me -+-+-+-+-+-+-+-+-+-+-+-+-+-+- Your Target Choice :hack.me hacks.me chop.me pros.me pro.me wifihack.me hackeie.me gohack.me howtohack.me hackprotect.me comehackwith.me intahackgram.me soyouthinkyoucanhack.me come-hack-with.me mindhack.me datehack.me luxhack.me hacksub.me hacks.org computing.org pros.org hackers.info hacker.eu hacks.co computing.eu hacks.net chops.eu pros.co hack.es chop.info hack.it chop.co pros.co.uk old.co cut.co hack.info hackers.fr hackers.it hacker.es hacker.it hacks.es hacks.fr hacks.nl chops.nl computing.ch chop.nl old.ch old.it old.nl old.fr cut.es cut.nl chop.club chops.net hacks.de hack.fr pros.de old.info old.at hackers.es hackers.ch hacker.fr hacks.ch pros.ch hackers.club chops.club pros.club cut.club old.club pro.guru old.berlin hackhashgraph.com hackers.at hacks.at computing.at hack.xyz robloxhack.com hackgems.com cheathack.com updatehack.com hackzone.com hackroblox.com hackdeutsch.com hackguru.com legendhack.com instahack.com hackstore.com hackarena.com hackyogi.com mailhack.com hackdays.com hackslash.com zerohack.com rankhack.com moneyhack.com mindhack.com antihack.com hackbart.com hackteck.com bedshack.com payshack.com
La lista anterior se puede usar para hacer un diccionario que se puede usar en ataques de diccionario o en otras actividades de hacking
Obtener IP inversa del objetivo
Teclear 14 para la búsqueda de ip inversa
Escriba hack.me
Enter 00/18 => =>  14 Enter IP Address : hack.me 74-50-111-244.static.hvvc.us hack.me ns4.hack.me www.hack.me
Después de ejecutar el comando anterior, se muestra el destino en otras direcciones alojadas. La búsqueda inversa ayuda a encontrar las páginas de phishing o en otras actividades de hacking
La herramienta anterior muestra mucha información sobre el objetivo que puede ayudar a muchos pentesters o investigadores de seguridad. De acuerdo con investigadores de hacking ético en el Instituto Internacional de Seguridad Cibernética, Devploit es útil ya que ahorra mucho tiempo si se compara con otras herramientas. Es una herramienta fácil de usar para recopilar información.
PARA MAYOR INFORMACIÓN VISITE: https://noticiasseguridad.com/tutoriales/devploit-hackear-facilmente-con-este-sencillo-script-de-python/
0 notes
thetechnologyguy-blog1 · 6 years ago
Text
DO HACKING WITH SIMPLE PYTHON SCRIPT
Tumblr media
Pentesting is all about showing and reporting problems in web/mobile applications. This is the most popular part of cyber security which every researcher/security enthusiast want to do. Because it gives an brief knowledge how to penetrate any web application. Pentesting is done by information gathering. There are many tools/scripts available over the internet which can be used for information gathering. So today we came with another tool written by Joker Security. Tool named as Devploit which is used in information gathering and also another similar all in one tool is Mercury Tool.
Devploit is an very easy to use tool which gives information for your target. You have to just run this script with some of the basic commands of linux. You can gather a lot of information about your target before exploiting. This tool completes the list of various tools like DNS, Whois IP, Geo IP, Subnet Lookup, Port Scanner and many other tools which comes handy in initial phase of penetration testing. Now we will show you features of devploit. For showing you we have install devploit on Kali Linux. There are other Linux distros in which devploit support Ubuntu, Mint and parrot.
For cloning type git clone https://github.com/joker25000/Devploit.git
Then type cd Devploit
Type ls -ltr to check the permissions of the files that are included in devploit directory.
root@kali:/home/iicybersecurity/Downloads/Devploit# ls -ltr total 32 -rw-r--r-- 1 root root 1838 Dec 30 23:32 README.md -rw-r--r-- 1 root root 2154 Dec 30 23:32 install -rw-r--r-- 1 root root 8469 Dec 30 23:32 Devploit.py drwxr-xr-x 2 root root 4096 Dec 30 23:32 Dev -rw-r--r-- 1 root root 1990 Dec 30 23:32 update.py drwxr-xr-x 5 root root 4096 Dec 30 23:32 modules
By default devploit installer files does not come with execute permission so for changing permission of the install file type chmod u+x install
For checking if the permission has changed type ls -ltr. If the permission has changed then install file will turn into green color.
root@kali:/home/iicybersecurity/Downloads/Devploit# chmod u+x install root@kali:/home/iicybersecurity/Downloads/Devploit# ls -ltr total 32 -rw-r--r-- 1 root root 1838 Dec 30 23:32 README.md -rwxr--r-- 1 root root 2154 Dec 30 23:32 install -rw-r--r-- 1 root root 8469 Dec 30 23:32 Devploit.py drwxr-xr-x 2 root root 4096 Dec 30 23:32 Dev -rw-r--r-- 1 root root 1990 Dec 30 23:32 update.py drwxr-xr-x 5 root root 4096 Dec 30 23:32 modules
Then type python Devploit.py
root@kali:/home/iicybersecurity/Downloads/Devploit# python Devploit.py
              ,               |'.             , ...  Devploit  -  Information Gathering Tool               |  '-._        / )             .'  .._  ',     /_'-,            '   /  _'.'_\   /._)')           :   /  '_' '_'  /  _.'           |E |   |Q| |Q| /   /          .'  _\  '-' '-'    /        .'--.(S     ,__` )  /              '-.     _.'  /            __.--'----(   /        _.-'     :   __\ /       (      __.' :'  :Y        '.   '._,  :            '.     ) :.__:|            \    \______/             '._L/_H____]
==[[ .:: Name : Devploit ::.]]== ==[[ .:: Version: 3.6 ::.]]== ==[[ .:: Author : Joker-Security ::.]]== ==[[ .:: Github : http://www.github.com/joker25000 ::.]]== ==[[ .:: Twitter: https://twitter.com/SecurityJoker ::.]]==
This Is Simple Script By : Joker-Security  Let's Start  --> --> -->
1 }  ==>  DNS Lookup 2 }  ==>  Whois Lookup 3 }  ==>  GeoIP Lookup 4 }  ==>  Subnet Lookup 5 }  ==>  Port Scanner 6 }  ==>  Extract Links 7 }  ==>  Zone Transfer 8 }  ==>  HTTP Header 9 }  ==>  Host Finder 10}  ==>  IP-Locator 11}  ==>  Traceroute 12}  ==>  Robots.txt 13}  ==>  Host DNS Finder 14}  ==>  Revrse IP Lookup 15}  ==>  Collection Email 16}  ==>  Subdomain Finder 17}  ==>  Install & Update 18}  ==>  About Me 00}  ==>  Exit
Enter 00/18 => =>
Choose any option on which tool you want to use. Then type tool number as shown below.
GETTING DNS OF THE TARGET :-
Type 1
Type <Target URL>.
Type www.hackthissite.org
Enter 00/18 => =>  1 Entre Your Domain :www.hackthissite.org www.hackthissite.org.   3599    IN      A       137.74.187.100 www.hackthissite.org.   3599    IN      A       137.74.187.104 www.hackthissite.org.   3599    IN      A       137.74.187.103 www.hackthissite.org.   3599    IN      A       137.74.187.101 www.hackthissite.org.   3599    IN      A       137.74.187.102 www.hackthissite.org.   3599    IN      AAAA    2001:41d0:8:ccd8:137:74:187:101 www.hackthissite.org.   3599    IN      AAAA    2001:41d0:8:ccd8:137:74:187:103 www.hackthissite.org.   3599    IN      AAAA    2001:41d0:8:ccd8:137:74:187:102 www.hackthissite.org.   3599    IN      AAAA    2001:41d0:8:ccd8:137:74:187:104 www.hackthissite.org.   3599    IN      AAAA    2001:41d0:8:ccd8:137:74:187:100
As shown above after scanning using DNS lookup. Dns shows the A and AAA records of the target. This information can be used in other hacking activities.
GETTING WHOIS LOOKUP FOR THE TARGET :-
Type 2 for whois lookup which tells you the basic information about the target. It shows server, update data, expiry date and many more information which whois provide.
Then type hack.me
Enter 00/18 => =>  2 Enter IP Address : hack.me Domain Name: HACK.ME Registry Domain ID: D108500000000003559-AGRS Registrar WHOIS Server: whois.godaddy.com Registrar URL: http://www.godaddy.com Updated Date: 2018-04-30T15:06:34Z Creation Date: 2008-04-29T18:00:32Z Registry Expiry Date: 2021-04-29T18:00:32Z Registrar Registration Expiration Date: Registrar: GoDaddy.com, LLC Registrar IANA ID: 146 Registrar Abuse Contact Email: [email protected] Registrar Abuse Contact Phone: +1.4806242505 Reseller: Domain Status: clientDeleteProhibited https://icann.org/epp#clientDeleteProhibited Domain Status: clientRenewProhibited https://icann.org/epp#clientRenewProhibited Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited Domain Status: clientUpdateProhibited https://icann.org/epp#clientUpdateProhibited Registrant Organization: Domains By Proxy, LLC Registrant State/Province: Arizona Registrant Country: US Name Server: NS5.DNSMADEEASY.COM Name Server: NS6.DNSMADEEASY.COM Name Server: NS7.DNSMADEEASY.COM Name Server: NS4.HACK.ME DNSSEC: unsigned URL of the ICANN Whois Inaccuracy Complaint Form  https://www.icann.org/wicf/) Last update of WHOIS database: 2018-12-31T06:14:27Z <<< For more information on Whois status codes, please visit https://icann.org/epp The Registrar of Record identified in this output may have an RDDS service that can be queried for additional information on how to contact the Registrant, Admin, or Tech contact of the queried domain name.
The above command shows the server of the target. Name server, Domain status. Registrar email ID and phone no.
The above information can be used in other hacking activities.
GETTING EMAILS OF THE TARGET :-
Type 15 for collection mails.
Type hack.me
Enter 00/18 => =>  15 Entre Your Domain :hack.me [>] Initiating 3 intel modules [>] Loading Alpha module (1/3) [>] Beta module deployed (2/3) [>] Gamma module initiated (3/3) [+] Emails found: [email protected] [email protected] [+] Hosts found in search engines: -] Resolving hostnames IPs… 74.50.111.244:me.hack.me [+] Virtual hosts: 74.50.111.244   hack.me 74.50.111.244   hack.me
The above shows the email addresses of the target. The above information can be used in other hacking activities.
GETTING SUBDOMAINS OF THE TARGET :-
Type 16 for subdomain finder.
Type hack.me
Enter 00/18 => =>  16 Entre Your Domain :hack.me -+-+-+-+-+-+-+-+-+-+-+-+-+-+- Your Target Choice :hack.me hacks.me chop.me pros.me pro.me wifihack.me hackeie.me gohack.me howtohack.me hackprotect.me comehackwith.me intahackgram.me soyouthinkyoucanhack.me come-hack-with.me mindhack.me datehack.me luxhack.me hacksub.me hacks.org computing.org pros.org hackers.info hacker.eu hacks.co computing.eu hacks.net chops.eu pros.co hack.es chop.info hack.it chop.co pros.co.uk old.co cut.co hack.info hackers.fr hackers.it hacker.es hacker.it hacks.es hacks.fr hacks.nl chops.nl computing.ch chop.nl old.ch old.it old.nl old.fr cut.es cut.nl chop.club chops.net hacks.de hack.fr pros.de old.info old.at hackers.es hackers.ch hacker.fr hacks.ch pros.ch hackers.club chops.club pros.club cut.club old.club pro.guru old.berlin hackhashgraph.com hackers.at hacks.at computing.at hack.xyz robloxhack.com hackgems.com cheathack.com updatehack.com hackzone.com hackroblox.com hackdeutsch.com hackguru.com legendhack.com instahack.com hackstore.com hackarena.com hackyogi.com mailhack.com hackdays.com hackslash.com zerohack.com rankhack.com moneyhack.com mindhack.com antihack.com hackbart.com hackteck.com bedshack.com payshack.com
The above list can be used to make an dictionary which can used in dictionary attack or in other hacking activities.
GETTING REVERSE IPS OF THE TARGET :-
Type 14 for reverse ip lookup.
Type hack.me
Enter 00/18 => =>  14 Enter IP Address : hack.me 74-50-111-244.static.hvvc.us hack.me ns4.hack.me www.hack.me
After executing the above command it shows the target another hosted addresses. Reverse lookup helps in finding the phishing pages or in other hacking activities.
The above tool shows many information about the target which can help lots of pentesters or security researchers. According to ethical hacking researcher in international institute of cyber security Devploit comes handy as it consumes lot of time if you compare to other tools. Its an easy tool for gathering information.
FOR FURTHER DETAILS, PLEASE VISIT: https://www.securitynewspaper.com/2019/01/02/do-hacking-with-simple-python-script/
0 notes
pentesttoolz · 5 years ago
Text
ParamSpider - Mining Parameters From Dark Corners Of Web Archives
ParamSpider - Mining Parameters From Dark Corners Of Web Archives #Archives #ContentDiscovery #Corners #Dark #Fuzzing
[sc name=”ad_1″]
ParamSpider : Parameter miner for humans.
Key Features :
Finds parameters from web archives of the entered domain.
Finds parameters from subdomains as well.
Gives support to exclude urls with specific extensions.
Saves the output result in a nice and clean manner.
It mines the parameters from web archives (without interacting with the target host)
Usage instructions :
Note : Use…
View On WordPress
0 notes
pentesttoolz · 7 years ago
Text
Censys Subdomain Finder - Perform Subdomain Enumeration Using The Certificate Transparency Logs From Censys
Censys Subdomain Finder - Perform Subdomain Enumeration Using The Certificate Transparency Logs From Censys #Subdomain #Finder #Certificate #Enumeration
This is a tool to enumerate subdomains using the Certificate Transparency logs stored by Censys. It should return any subdomain who has ever been issued a SSL certificate by a public CA.
See it in action:
$ python censys_subdomain_finder.py github.com
[*] Searching Censys for subdomains of github.com [*] Found 42 unique subdomains of github.com in ~1.7 seconds
– hq.github.com – talks.github.com
View On WordPress
0 notes