knockKnock Subdomain Scan IntroductionKnock allows you to scan subdomains, Transfer Zone discovery, Wildcard testing with internal or external wordlist.This program is self contained, doesn't need to be installed in any particular location. All it needs is a recent version of Python 2.x Only for use the Zone Transfer option (-zt) you must install the module dnspython, otherwise you can do without. If the name server allows zone transfers to occur, all the DNS names and IP addresses hosted by the name server will be returned in human-readable ASCII text. Usage$ python knock.py <option> <url> Rapid ScanScanning with internal wordlist: $ python knock.py <url> Scanning with external wordlist: $ python knock.py <url> <wordlist> Options-zt Zone Transfer discovery: $ python knock.py -zt <url> -dns Dns resolver: $ python knock.py -dns <url> -wc Wildcard testing: $ python knock.py -wc <url> -bw Wildcard bypass: $ python knock.py -bw <stringexclude> <url> Executable on LinuxDownload knock tar.gz archive and extract file knock.py From shell command:$ sudo cp knock.py /usr/local/bin/knock Now you can use knock as shown in the examples. Executable on WindowsDownload knock zip archive, extract folder and use file knock.exe Required: Python 2.x and Dnspython ExamplesScanning with internal wordlist
Scanning with external wordlist $ ./knock domain.com wordlist.txt Zone Transfer discovery (-zt) $ ./knock -zt domain.com Dns resolver (-dns) $ ./knock -dns domain.com Wildcard testing (-wc) $ ./knock -wc domain.com Wildcard bypass with internal wordlist (-wc) $ ./knock -bw stringexclude domain.com Wildcard bypass with external wordlist (-wc) $ ./knock -bw stringexclude domain.com wordlist.txt Sample stdout to fileThis will cause the ouput of a knock to be written to a text file You do not understand how to use knock? Back to play with the Xbox!$ ./knock domain.com > output.txt DOWNLOAD |
- Blogger Comment
- Facebook Comment
Subscribe to:
Post Comments
(
Atom
)
0 comments:
Post a Comment