h4cker/programming_and_scripting_for_cybersecurity/recon_scripts/dns-recon2.sh
2023-01-17 23:43:55 -05:00

6 lines
247 B
Bash

#!/bin/bash
# bruteforce subdomains
# Use a wordlist of your choice. I am using dnscan's wordlist in this example
for domain in $(cat /usr/share/wordlists/amass/fierce_hostlist.txt); do host $domain.h4cker.org; done | grep -v NXDOMAIN | sort -u