Kali Linux

SDomDiscover : A Easy-To-Use Python Tool To Perform DNS Recon

SDomDiscover a easy-to-use python tool to perform dns recon, subdomain enumeration and much more

The purpouse of this tool is helping bug haunters and pentesters during reconnaissance

If you want to know more about the tool you can read my own post in my blog (written in spanish)

Installation

It can be used in any system with python3

You can easily install AORT using pip:

pip3 install aort

If you want to install it from source:

git clone https://github.com/D3Ext/AORT
cd AORT
pip3 install -r requirements.txt

One-liner

git clone https://github.com/D3Ext/AORT && cd AORT && pip3 install -r requirements.txt && python3 AORT.py

Usage

Common usages

If installed with pip3:

aort

To see the help panel and other parameters

python3 AORT.py -h

Main usage of the tool to dump the valid domains in the SSL certificate

python3 AORT.py -d example.com

Used to perform all the queries and recognizement

python3 AORT.py -d domain.com –all

Features

  • Enumerate subdomains using passive techniques
  • A lot of extra queries to enumerate the DNS
  • Domain Zone trasnfer attack
  • WAF type detection
  • Subdomain Takeover checker
  • Wayback machine support to enumerate endpoints
  • Email harvesting

Third part

The tool uses different services to get subdomains in different ways

The WAF detector was modified and addapted from CRLFSuite concept

All DNS queries are scripted in python at 100%

Email harvesting using Proxycrawl API with personal token (you can register a free account with 100 uses)

R K

Recent Posts

Pystinger : Bypass Firewall For Traffic Forwarding Using Webshell

Pystinger is a Python-based tool that enables SOCKS4 proxying and port mapping through webshells. It…

1 week ago

CVE-Search : A Tool To Perform Local Searches For Known Vulnerabilities

Introduction When it comes to cybersecurity, speed and privacy are critical. Public vulnerability databases like…

1 week ago

CVE-Search : A Tool To Perform Local Searches For Known Vulnerabilities

Introduction When it comes to cybersecurity, speed and privacy are critical. Public vulnerability databases like…

1 week ago

How to Bash Append to File: A Simple Guide for Beginners

If you are working with Linux or writing bash scripts, one of the most common…

1 week ago

Mastering the Bash Case Statement with Simple Examples

What is a bash case statement? A bash case statement is a way to control…

1 week ago

How to Check if a File Exists in Bash – Simply Explained

Why Do We Check Files in Bash? When writing a Bash script, you often work…

1 week ago