Replies: 5 comments 1 reply
-
|
Thanks for your feature request @ocervell , we'll take a look into this! |
Beta Was this translation helpful? Give feedback.
-
|
This would be a nice addition ! Looking forward to seeing this implemented. |
Beta Was this translation helpful? Give feedback.
-
|
This would allow pipes that actually work for all domains by the way, instead of producing garbage results for some ;) |
Beta Was this translation helpful? Give feedback.
-
|
mentioning @Mzack9999 for review |
Beta Was this translation helpful? Give feedback.
-
|
Just to piggy back on this issue, it's actually rather simple to implement: Send simple DNS A queries to "impossible" subdomains, like <RANDOM_GENERATED_STRING>.< DOMAIN >. If the query responds with an OK status, abort the run when doing bruteforcing since all elements in the wordlist will return garbage data. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
before abruptely being closed:
no, it's not the same feature as "wildcard filtering".
Explanation:
Some domains will respond with DNS code
noerrorand fake records (A, CNAME, etc...) for any subdomain query that you throw at it.Would be nice to be able to detect those, and abort the run if we encounter them (as it's useless to check this way for those).
Implementation:
noerror, then abort the run with an info message saying that DNS queries all return for this domain and doing DNS lookups is useless.--autocalibrate/-acthat will handle this.Example command:
For bruteforce mode:
Note that this will also be useful for the normal operation mode:
Beta Was this translation helpful? Give feedback.
All reactions