Description: Fierce is another feather in the crown of information gathering tool. This fierce possess handful functionality for penetration testing. This is mainly used when blind pentests have been been performed and it consumes lot of time, even I have experienced the same thing.
This fierce tool mainly tries to get zone transfer records and also possess brute force force mechanism for finding the existed sub domains. In this video demonstration i have used the following command line arguments. For better usage of this tool to exhibit output on zone transfers I have demonstrated on different domains for better understand.
Commands are :
perl fierce.pl -dns securitytube.net
perl fierce.pl -dns securitytube.net -wordlist headerss.txt -wide
./dnsrecon.py –d securitytyube.net
perl fierce.pl -range 204.13.248.76-255 -dnsserver ns1.mydyndns.org
Command description:
At this moment fierce identifies authorative dns then tries get information on the zone transfer.
====> perl fierce.pl -dns securitytube.net
At this stage its trying to find the sub domains using the supplied wordlist
====> perl fierce.pl -dns securitytube.net -wordlist headerss.txt -wide
This command gives the information on the ns mx host ip details.
====> ./dnsrecon.py –d securitytube.net
Determines the range of name servers of the target domain.
====> perl fierce.pl -range 204.13.248.76-255 -dnsserver ns1.mydyndns.org
Tags: st-tools , tools , fierce , information-gathering , securitytube.net ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.
Very well written description. I wish every video on ST could have so much content in it :)
@Vivel-Ramachandran sir: Yes sir we will continue this for our upcoming videos too.
awesome yaar