Categories: Kali Linux

Knock – Tool Designed To Enumerate Subdomains

Knock is a python tool designed to enumerate subdomains on a target domain through a wordlist.

It is designed to scan for DNS zone transfer and to try to bypass the wildcard DNS record automatically if it is enabled.

Now knockpy supports queries to VirusTotal subdomains, you can setting the API_KEY within the config.json file.

$ knockpy domain.com

If you want to save full log like this one just type:

$ knockpy domain.com –json

Also Read:DjangoHunter : Tool To Identify Incorrectly Configured Django Applications

Knock Install

  • Dnspython

$ sudo apt-get install python-dnspython

  • Installing

$ git clone https://github.com/guelfoweb/knock.git
$ cd knock
$ nano knockpy/config.json <- set your virustotal API_KEY
$ sudo python setup.py install

Note : It’s recommended to use Google DNS: 8.8.8.8 and 8.8.4.4

  • Knockpy arguments

$ knockpy -h
usage: knockpy [-h] [-v] [-w WORDLIST] [-r] [-c] [-j] domain
knock subdomain scan
knockpy v.4.1
Author: Gianni ‘guelfoweb’ Amato
Github: https://github.com/guelfoweb/knock
positional arguments:
domain target to scan, like domain.com
optional arguments:
-h, –help show this help message and exit
-v, –version show program’s version number and exit
-w WORDLIST specific path to wordlist file
-r, –resolve resolve ip or domain name
-c, –csv save output in csv
-f, –csvfields add fields name to the first row of csv output file
-j, –json export full report in JSON
example:
knockpy domain.com
knockpy domain.com -w wordlist.txt
knockpy -r domain.com or IP
knockpy -c domain.com

Note : For virustotal subdomains support you can setting your API_KEY in the config.json file.

Credit: Gianni ‘guelfoweb’ Amato

R K

Recent Posts

Pystinger : Bypass Firewall For Traffic Forwarding Using Webshell

Pystinger is a Python-based tool that enables SOCKS4 proxying and port mapping through webshells. It…

1 week ago

CVE-Search : A Tool To Perform Local Searches For Known Vulnerabilities

Introduction When it comes to cybersecurity, speed and privacy are critical. Public vulnerability databases like…

1 week ago

CVE-Search : A Tool To Perform Local Searches For Known Vulnerabilities

Introduction When it comes to cybersecurity, speed and privacy are critical. Public vulnerability databases like…

1 week ago

How to Bash Append to File: A Simple Guide for Beginners

If you are working with Linux or writing bash scripts, one of the most common…

1 week ago

Mastering the Bash Case Statement with Simple Examples

What is a bash case statement? A bash case statement is a way to control…

1 week ago

How to Check if a File Exists in Bash – Simply Explained

Why Do We Check Files in Bash? When writing a Bash script, you often work…

1 week ago