Metasploit mailing list archives
Re: errors using dns_enum
From: Chris Calaf <thelab13 () gmail com>
Date: Mon, 23 Nov 2009 13:03:24 -0500
I'll try this again because it seems like my post are not getting through.
osx:
msf auxiliary(dns_enum) > ruby -v
[*] exec: ruby -v
ruby 1.8.7 (2009-06-12 patchlevel 174) [i686-darwin10]
msf auxiliary(dns_enum) > info
Name: DNS Enumeration Module
Version: $Rev: 7500
License: Metasploit Framework License (BSD)
Provided by:
Carlos Perez <carlos_perez () darkoperator com
Basic options:
Name Current
Setting Required Description
----
--------------- --------
-----------
DOMAIN google.com
yes The target domain name
ENUM_AXFR
false yes
Initiate a zone Transfer against each NS record
ENUM_BRT
false yes
Brute force subdomains and hostnames via wordlist
ENUM_RVL
false yes
Reverse lookup a range of IP addresses
ENUM_SRV
true yes
Enumerate the most common SRV records
ENUM_STD
true yes
Enumerate standard record types (A,MX,NS,TXT and SOA)
ENUM_TLD
false yes
Perform a top-level domain expansion by replacing TLD and testing against
IANA TLD list
IPRANGE
no The target address range or CIDR identifier
NS
no Specify the nameserver to use for queries, otherwise use the
system DNS
STOP_WLDCRD
false yes
Stops Brute Force Enumeration if wildcard resolution is detected
WORDLIST /Users/lab13/tools/metasploit3/data/wordlists/namelist.txt
no Wordlist file for domain name brute force.
backtrack4:
msf auxiliary(dns_enum) > ruby -v
[*] exec: ruby -v
ruby 1.8.7 (2008-08-11 patchlevel 72) [i486-linux]
msf auxiliary(dns_enum) > info
Name: DNS Enumeration Module
Version: $Rev: 7500
License: Metasploit Framework License (BSD)
Provided by:
Carlos Perez <carlos_perez () darkoperator com>
Basic options:
Name Current Setting
Required Description
---- ---------------
-------- -----------
DOMAIN google.com
yes The target domain name
ENUM_AXFR false
yes Initiate a zone Transfer against each NS record
ENUM_BRT false
yes Brute force subdomains and hostnames via wordlist
ENUM_RVL false
yes Reverse lookup a range of IP addresses
ENUM_SRV true
yes Enumerate the most common SRV records
ENUM_STD true
yes Enumerate standard record types (A,MX,NS,TXT and SOA)
ENUM_TLD false
yes Perform a top-level domain expansion by replacing TLD and testing
against IANA TLD list
IPRANGE
no The target address range or CIDR identifier
NS
no Specify the nameserver to use for queries, otherwise use the
system DNS
STOP_WLDCRD false
yes Stops Brute Force Enumeration if wildcard resolution is detected
WORDLIST /pentest/exploits/framework3/data/wordlists/namelist.txt
no Wordlist file for domain name brute force.
On Fri, Nov 20, 2009 at 8:25 AM, Carlos Perez <carlos_perez () darkoperator com
wrote:
I was not able to replicate the error on my test systems can you send me a
ruby -v on each system and the domain and options so as to replicate it
better
Sent from my Mobile Phone
On Nov 20, 2009, at 9:10 AM, Chris Calaf <thelab13 () gmail com> wrote:
Apologies for the double post but first one did not hit the list.
I'm getting the following error when trying to use dns_enum on both BT4 and
Snow Leopard. I installed the macports version of net-dns. Should I be
installing it via CPAN or some ruby port?
Using ruby 1.9
=[ metasploit v3.4-dev [core:3.4 api:1.0]
+ -- --=[ 448 exploits - 216 auxiliary
+ -- --=[ 192 payloads - 22 encoders - 8 nops
=[ svn r7568 updated today (2009.11.18)
msf > use auxiliary/gather/dns_enum
msf auxiliary(dns_enum) > set DOMAIN <http://somedomain.com/>
somedomain.com
DOMAIN => <http://somedomain.com/>somedomain.com
msf auxiliary(dns_enum) > run
[-] Auxiliary failed: NameError /Users/user/tools/metasploit3/
data/msfweb/vendor/rails/activesupport/lib/active_support/dependencies.rb:105:in
`const_missing': uninitialized constant Net::DNS::RR::OPT
[-] Call stack:
[-] /Users/user/tools/metasploit3/lib/net/dns/rr.rb:325:in
`new_from_binary'
[-] (eval):1:in `new_from_binary'
[-] /Users/user/tools/metasploit3/lib/net/dns/rr.rb:175:in `eval'
[-] /Users/user/tools/metasploit3/lib/net/dns/rr.rb:325:in
`new_from_binary'
[-] /Users/user/tools/metasploit3/lib/net/dns/rr.rb:175:in `send'
[-] /Users/user/tools/metasploit3/lib/net/dns/rr.rb:175:in `parse_packet'
[-] /Users/user/tools/metasploit3/lib/net/dns/packet.rb:546:in
`new_from_data'
[-] /Users/user/tools/metasploit3/lib/net/dns/packet.rb:545:in `times'
[-] /Users/user/tools/metasploit3/lib/net/dns/packet.rb:545:in
`new_from_data'
[-] /Users/user/tools/metasploit3/lib/net/dns/packet.rb:152:in `send'
[-] /Users/user/tools/metasploit3/lib/net/dns/packet.rb:152:in `parse'
[-] /Users/user/tools/metasploit3/lib/net/dns/resolver.rb:979:in `send'
[-] /Users/user/tools/metasploit3/lib/net/dns/resolver.rb:890:in `query'
[-] (eval):59:in `switchdns'
[-] (eval):423:in `run'
[*] Auxiliary module execut
_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework
_______________________________________________ https://mail.metasploit.com/mailman/listinfo/framework
Current thread:
- errors using dns_enum thelab13 (Nov 19)
- <Possible follow-ups>
- errors using dns_enum Chris Calaf (Nov 20)
- Re: errors using dns_enum Carlos Perez (Nov 20)
- Re: errors using dns_enum Chris Calaf (Nov 20)
- Re: errors using dns_enum Chris Calaf (Nov 23)
- Re: errors using dns_enum Carlos Perez (Nov 23)
- Re: errors using dns_enum Chris Calaf (Nov 23)
- Re: errors using dns_enum Carlos Perez (Nov 20)
