Results 1 to 2 of 2

Thread: em3rgency's domain enumeration script!

  1. #1
    Just burned their ISO em3rgency's Avatar
    Join Date
    Nov 2012
    Posts
    16

    Default em3rgency's domain enumeration script!

    Hey guys,

    I wrote this up to make passive information gathering a little easier. This will run a series of tools to enumeration domain information. Hope you like it!

    here is the download link!

    https://docs.google.com/open?id=0ByU...016eGZvcGhtYTQ

    Visit http://em3rgency.com


    enum.jpg



    #!/bin/bash

    clear
    #DEFINED COLOR SETTINGS
    RED=$(tput setaf 1 && tput bold)
    GREEN=$(tput setaf 2 && tput bold)
    STAND=$(tput sgr0)
    BLUE=$(tput setaf 6 && tput bold)

    echo “”
    echo “”
    echo “”
    echo $RED” +##############################################+”
    echo $RED” + em3rgency’s Domain enumeration script +”
    echo $RED” + +”
    echo $RED” + Version 1.0 +”
    echo $RED” + +”
    echo $RED” + www.em3rgency.com +”
    echo $RED” +##############################################+”
    echo “”
    echo $BLUE” Visit http://www.em3rgency.com for updates to this script. Thanks”
    echo “”
    echo $BLUE” This script will perform various reconnaissance on your target domain.”
    sleep 3
    clear

    echo “”
    echo $RED” **************************************”;
    echo $RED” * 1. WHOIS lookup *”;
    echo $RED” * 2. Dig and host list *”;
    echo $RED” * 3. TCP traceroute *”;
    echo $RED” * 4. DNS enumeration *”;
    echo $RED” * 5. Fierce *”;
    echo $RED” * 6. Nmap *”;
    echo $RED” * 7. Enumerate ALL *”;
    echo $RED” * 8. EXIT *”;
    echo $RED” **************************************”;

    echo $BLUE” Select Menu Option:”$STAND
    read menuoption

    if [ $menuoption = "1" ]; then
    echo “Enter the target EG. domain.org”
    read target
    whois $target
    echo “”
    read -p “Please press ENTER to return to the menu”
    ./enum.sh
    else

    if [ $menuoption = "2" ]; then
    echo “Enter the target EG. domain.org”
    read target
    dig $target any
    echo “”
    echo “”
    host -l $target
    echo “”
    read -p “Please press ENTER to return to the menu”
    ./enum.sh
    else

    if [ $menuoption = "3" ]; then
    echo “Enter the target EG. domain.org”
    read target
    echo “”
    echo $STAND”Please type the name of your network interface Example: eth0 ”
    read IFACE;
    echo “”
    echo “”
    tcptraceroute -i $IFACE $target
    ./enum.sh
    else

    if [ $menuoption = "4" ]; then
    echo “Enter the target EG. domain.org”
    read target
    echo “”
    cd /pentest/enumeration/dns/dnsenum
    perl dnsenum.pl –enum -f dns.txt –update a -r $target
    echo “”
    read -p “Please press ENTER to return to the menu”
    ./enum.sh
    else

    if [ $menuoption = "5" ]; then
    echo “Enter the target EG. domain.org”
    read target
    echo “”
    cd /pentest/enumeration/dns/fierce
    perl fierce.pl -dns $target
    echo “”
    read -p “Please press ENTER to return to the menu”
    ./enum.sh
    else

    if [ $menuoption = "6" ]; then
    echo “Enter the target EG. domain.org”
    read target
    echo “”
    cd /root
    nmap -PN -n -F -T4 -sV -A -oG $target.txt $target
    echo “”
    read -p “Please press ENTER to return to the menu”
    ./enum.sh
    else

    if [ $menuoption = "7" ]; then
    echo “Enter the target EG. domain.org”
    read target
    echo “”
    echo “”
    whois $target
    echo “”
    echo “”
    dig $target any
    echo “”
    echo “”
    host -l $target
    echo “”
    echo “”
    tcptraceroute -i eth0 $target
    echo “”
    echo “”
    cd /pentest/enumeration/dns/dnsenum
    perl dnsenum.pl –enum -f dns.txt –update a -r $target
    echo “”
    echo “”
    echo dnstracer $target
    dnstracer $target
    echo “”
    echo “”
    cd /pentest/enumeration/dns/fierce
    perl fierce.pl -dns $target
    echo “”
    echo “”
    cd /pentest/enumeration/web/lbd
    ./lbd.sh $target
    echo “”
    echo “”
    cd /pentest/enumeration/list-urls
    ./list-urls.py http://www.$target
    echo “”
    echo “”
    cd /root
    nmap -PN -n -F -T4 -sV -A -oG $target.txt $target
    echo “”
    echo “”
    amap -i $target.txt
    echo “”
    echo “”
    cd /pentest/enumeration/web/httprint/linux
    ./httprint -h www.$target -s signatures.txt -P0
    echo “”
    echo “”
    read -p “Please press ENTER to return to the menu”
    ./enum.sh
    else

    if [ $menuoption = "8" ]; then
    exit
    fi
    fi
    fi
    fi
    fi
    fi
    fi
    fi

  2. #2
    My life is this forum thorin's Avatar
    Join Date
    Jan 2010
    Posts
    2,629

    Default Re: em3rgency's domain enumeration script!

    It's not very passive if you're nmap'ing them...
    I'm a compulsive post editor, you might wanna wait until my post has been online for 5-10 mins before quoting it as it will likely change.

    I know I seem harsh in some of my replies. SORRY! But if you're doing something illegal or posting something that seems to be obvious BS I'm going to call you on it.

Similar Threads

  1. em3rgency update MITM script version 1.1
    By em3rgency in forum BackTrack 5 Experts Section
    Replies: 8
    Last Post: 01-30-2013, 03:07 AM
  2. ruby/python top level domain(tld)search script
    By drlamer in forum OLD Pentesting
    Replies: 10
    Last Post: 04-09-2009, 06:14 AM
  3. Meterpeter Script for Quick Local Enumeration of Windows Hots
    By BadKarmaPR in forum OLD Programming
    Replies: 13
    Last Post: 01-07-2009, 03:58 PM
  4. Meterpreter Script for Basic Network Enumeration
    By BadKarmaPR in forum OLD Programming
    Replies: 2
    Last Post: 01-04-2009, 10:43 AM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •