Bluto v1.1.22 ~ DNS Recon | Brute Forcer | DNS Zone Transfers | Email Enumeration | User Enumeration.
Changelog v1.1.22 Full Featured:
+ setup.py and Bluto folder version Fix.
The target domain is queried for MX and NS records. Sub-domains are passively gathered via NetCraft. The target domain NS records are each queried for potential Zone Transfers. If none of them gives up their spinach, Bluto will brute force subdomains using parallel sub processing on the top 20000 of the ‘The Alexa Top 1 Million subdomains’. NetCraft results are presented individually and are then compared to the brute force results, any duplications are removed and particularly interesting results are highlighted.
Installation And Update Using Git:
pip install git+git://github.com/RandomStorm/Bluto
pip install git+git://github.com/RandomStorm/Bluto --upgrade
Our Post Before