cyber-security-resources/programming_and_scripting_for_cybersecurity/recon_scripts/dns-recon2.sh

6 lines
247 B
Bash
Raw Normal View History

2021-07-19 03:37:18 +00:00
#!/bin/bash
# bruteforce subdomains
# Use a wordlist of your choice. I am using dnscan's wordlist in this example
2023-01-18 04:43:55 +00:00
for domain in $(cat /usr/share/wordlists/amass/fierce_hostlist.txt); do host $domain.h4cker.org; done | grep -v NXDOMAIN | sort -u