SubBrute is a community driven project with the goal of creating the fastest, and most accurate subdomain enumeration tool. Some of the magic behind SubBrute is that it uses open resolvers as a kind of proxy to circumvent DNS rate-limiting ( https://www.us-cert.gov/ncas/alerts/TA13-088A ). This design also provides a layer of anonymity, as SubBrute does not send traffic directly to the target's name servers.
Whats new in v2.0?
A lot of exciting updates... except for the readme file, which still needs to be updated.
Whats new in v1.2.1?
The big news in this version is that SubBrute is now a recursive DNS-spider, and also a library, more on this later. SubBrute should be easy to use, so the interface should be intuitive (like nmap!), if you would like the interface to change, let us know. In this version we are opening up SubBrute's fast DNS resolution pipeline for any DNS record type. Additionally, SubBrute now has a feature to detect subdomains were their resolution is intentionally blocked, which sometimes happens when a subdomain is intended for for use on an internal network.
- SubBrute is now a DNS spider that recursively crawls enumerated DNS records. This feature boosted *.google.com from 123 to 162 subdomains. (Always enabled)
- --type enumerate an arbitrary record type (AAAA, CNAME, SOA, TXT, MX...)
- -s can now read subdomains from result files.
- New useage - The subdomains enumerated from previous scans can now be used as input to enumerate other DNS records. The following commands demonstrate this new functionality:
./subbrute.py google.com -o google.names
...162 subdomains found...
./subbrute.py -s google.names google.com --type TXT
google.com,"v=spf1 include:_spf.google.com ip4:220.127.116.11/31 ip4:18.104.22.168/31 ~all"
./subbrute.py -s google.names google.com --type CNAME
- SubBrute is now a subdomain enumeration library with a python interface: subbrute.run() Do you want to use SubBrute in your python projects? Consider the following:
for d in subbrute.run("google.com"):
Whats new in v1.1?
This version merges pull requests from the community; changes from JordanMilne, KxCode and rc0r is in this release. In SubBrute 1.1 we fixed bugs, improved accuracy, and efficiency. As requested, this project is now GPLv3.
Accuracy and better wildcard detection:
- A new filter that can pickup geolocation aware wildcards.
- Filter misbehaving nameservers
- More than 2,000 high quality nameservers were added to resolvers.txt, these servers will resolve multiple queries in under 1 sec.
- Nameservers are verified when they are needed. A seperate thread is responsible creating a feed of nameservers, and corresponding wildcard blacklist.
- -a will list all addresses associated with a subdomain.
- -v debug output, to help developers/hackers debug subbrute.
- -o output results to file.
The 'names.txt' list was created using some creative Google hacks with additions from the community. SubBrute has a feature to build your own subdomain lists by matching sub-domains with regular expression and sorting by frequency of occurrence:
- python subroute.py -f full.html > my_subs.txt
No install required for Windows, just cd into the 'windows' folder:
- subbrute.exe google.com
(On a side note giving a makefile root always bothers me, it would be a great way to install a backdoor...)
Under Ubuntu/Debian all you need is:
- sudo apt-get install python-dnspython
Easy to use:
- ./subbrute.py google.com
- ./subbrute.py google.com gmail.com blogger.com
- ./subbrute.py -t list.txt
- ./subbrute.py gmail.com > gmail.out
- ./subbrute.py -t gmail.out