8000 GitHub - hoshigakikisame/nwp: Eliminating common domain wildcard instances, by matching similar DNS answer from the corresponding parent.
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content

Eliminating common domain wildcard instances, by matching similar DNS answer from the corresponding parent.

License

Notifications You must be signed in to change notification settings

hoshigakikisame/nwp

Repository files navigation

No Wildcard Please

Eliminating common domain wildcard instances, by matching similar DNS answer from the corresponding parent.

Disclaimer: This is an experimental tool, just to see if I can prove my hypothesis to differentiate common domain wildcard instances and the actual unique one using DNS proto to avoid using banner grabbing and http probing.

What NWP for?

  • It is designed to help security researchers and domain analysts identify and differentiate between soulless filler wildcard DNS records and unique soulful DNS records for domains. This can be particularly useful in penetration testing, bug bounty hunting, and domain enumeration tasks.
  • The use case is to avoid the common pitfalls of wildcard DNS records, which can lead to false positives in security assessments and domain analysis (e.g., when a wildcard record is used to catch all subdomains, making it difficult to identify unique subdomains or services).
  • I personally use it as a middleman between DNS resolver & bruteforcer tools e.g puredns, dnsx; and http probing tools e.g httpx, httprobe, to filter out wildcard DNS records before they reach the probing stage.

Installation

go install -v github.com/hoshigakikisame/nwp/cmd/nwp@latest

Usage

$ nwp -h

  ___ _    _____
 / _ \ |/|/ / _ \
/_//_/__,__/ .__/
          /_/     v0.0.3

by @ferdirianrk


Usage:
  nwp [flags]

Flags:
   -c, -concurrency int                  Max concurrency (default 3)
   -w, -wildcards string                 Wildcards file path
   -s, -subdomains string                Subdomains file path
   -cfl, -common-fingerprints-limit int  Limit for common fingerprints to be generated (default 7)
   -o, -output string                    Output file path to save results
   -inwm, -include-non-wildcard-members  Include non-wildcard members in the output
   -v, -verbose                          Enable verbose output
   -q, -quiet                            Enable quiet mode (no logging)

Anyway, thanks to infosec-au for the inspiring name.

About

Eliminating common domain wildcard instances, by matching similar DNS answer from the corresponding parent.

Topics

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Languages

0