dnsenum 1.3.0-4 source package in Ubuntu


dnsenum (1.3.0-4) unstable; urgency=medium

  [ Joao Eriberto Mota Filho ]
  * debian/lintian-overrides: created to override a false positive.

  [ Samuel Henrique ]
  * debian/tests/control: added superficial restriction. (Closes: #969820)

 -- Joao Eriberto Mota Filho <email address hidden>  Thu, 17 Sep 2020 14:58:49 -0300

Upload details

Uploaded by:
Debian Security Tools
Uploaded to:
Original maintainer:
Debian Security Tools
Medium Urgency

See full publishing history Publishing

Series Pocket Published Component Section
Impish release universe misc
Hirsute release universe misc


Hirsute: [FULLYBUILT] amd64


File Size SHA-256 Checksum
dnsenum_1.3.0-4.dsc 1.9 KiB a6f1cb1a4becc91dda35924de34ef33b0a9b363a8c17c9ec8ef079af90ba831d
dnsenum_1.3.0.orig.tar.gz 20.9 KiB 1585a83667baaef15d27b5fa420f35915db28c9173b90573ec581afc9232bef0
dnsenum_1.3.0-4.debian.tar.xz 5.5 KiB 85dad6e6131cec2768d0db8ff2372f1dbfcc6f861ba3189d6b1e3d210a307ef0

Available diffs

No changes file available.

Binary packages built by this source

dnsenum: tool to enumerate domain DNS information

 Dnsenum is a multithreaded perl script to enumerate DNS information of a
 domain and to discover non-contiguous ip blocks. The main purpose of Dnsenum
 is to gather as much information as possible about a domain. The program
 currently performs the following operations:
   1) Get the host's addresses (A record).
   2) Get the namservers (threaded).
   3) Get the MX record (threaded).
   4) Perform axfr queries on nameservers and get BIND versions(threaded).
   5) Get extra names and subdomains via google scraping (google query =
      "allinurl: -www site:domain").
   6) Brute force subdomains from file, can also perform recursion on subdomain
      that have NS records (all threaded).
   7) Calculate C class domain network ranges and perform whois queries on them
   8) Perform reverse lookups on netranges (C class or/and whois netranges)
   9) Write to domain_ips.txt file ip-blocks.
 This program is useful for pentesters, ethical hackers and forensics experts.
 It also can be used for security tests.