dnsenum 1.3.0-5 source package in Ubuntu


dnsenum (1.3.0-5) unstable; urgency=medium

  * debian/control: bumped Standards-Version to 4.5.1.
  * debian/copyright: updated packaging copyright years.
  * debian/tests/control: added new tests.
  * debian/watch: updated the search rule to make it compliant with new
    standards of the GitHub.

 -- Joao Eriberto Mota Filho <email address hidden>  Sun, 15 Aug 2021 14:48:51 -0300

Upload details

Uploaded by:
Debian Security Tools
Uploaded to:
Original maintainer:
Debian Security Tools
Medium Urgency

See full publishing history Publishing

Series Pocket Published Component Section
Jammy release universe misc


Jammy: [FULLYBUILT] amd64


File Size SHA-256 Checksum
dnsenum_1.3.0-5.dsc 1.9 KiB efbac0a9f645b6dcb87115b13989abd475830b83e665410b9ac3d43fbd94c4ce
dnsenum_1.3.0.orig.tar.gz 20.9 KiB 1585a83667baaef15d27b5fa420f35915db28c9173b90573ec581afc9232bef0
dnsenum_1.3.0-5.debian.tar.xz 5.8 KiB 48739ee17399a0dcd6ef9be143d69a21e14e78c6fba71c8ab662567b1faf635c

Available diffs

No changes file available.

Binary packages built by this source

dnsenum: tool to enumerate domain DNS information

 Dnsenum is a multithreaded perl script to enumerate DNS information of a
 domain and to discover non-contiguous ip blocks. The main purpose of Dnsenum
 is to gather as much information as possible about a domain. The program
 currently performs the following operations:
   1) Get the host's addresses (A record).
   2) Get the namservers (threaded).
   3) Get the MX record (threaded).
   4) Perform axfr queries on nameservers and get BIND versions(threaded).
   5) Get extra names and subdomains via google scraping (google query =
      "allinurl: -www site:domain").
   6) Brute force subdomains from file, can also perform recursion on subdomain
      that have NS records (all threaded).
   7) Calculate C class domain network ranges and perform whois queries on them
   8) Perform reverse lookups on netranges (C class or/and whois netranges)
   9) Write to domain_ips.txt file ip-blocks.
 This program is useful for pentesters, ethical hackers and forensics experts.
 It also can be used for security tests.