Description: It is very difficult to discover and gather information about a corporate network which is non-contiguous using traditional tools. We can use a normal scanner against an IP range, but if the IP ranges are nowhere near one another there may be chance of missing chunks of networks. For this type of situation Fierce is used.
Fierce is a reconnaissance tool written in PERL script that scans domains using several techniques. it is not a DDoS tool and also it is not for scaning the whole network. It can not perform any attacks. It is designede to locate likely targets both inside and outside a corporate network. The following is the working process of fierce.
First it asks DNS for the DNS servers of the target. If DNS server of target is misconfigured then fierce attempts to dump the SOA records for the domain. If it gets fail it attempts to "guess" names that are common amongst different companies.
Source : Ozgur YILDIRIM from Youtube
Tags: Fierce , Tool , BackTrack ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.
Hmm Nice Video But i like dnsmap tool watch this video http://www.securitytube.net/video/4334
i think nmap is better option.any way thanks for video
... theHarvester.py