kawaiipantsu / redjoust

A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Written in nodeJS and Electron.
https://thugs.red
MIT License
25 stars 8 forks source link

DNS Information Recon (Deep dive) #1

Open kawaiipantsu opened 2 years ago

kawaiipantsu commented 2 years ago

DNS Information Recon (Deep dive)


Item condition criteria: Target must be a host/domain name Item gather type: Passive

This is the task/issue for creating the "DNS Information Recon" item, that does a deep dive into osint dns info etc. I have made a list of things that i want it to do out of the box, its a lot but again it all depends on how it's shown.

Attached files

DNS-Token-Fingerprints.txt

kawaiipantsu commented 2 years ago

A little progress update, SOA, NS and Addresses lookup is done image

kawaiipantsu commented 2 years ago

First sneak preview of "host fuzz" output, it shows if the subdomain have A and/or AAAA resolving etc. And color code green/red. So in the example below you know that your target has etc. "jira.mytarget.com" and so forth. I am making it so if you click a "subdomain/fuzz" word it will be set as the new target and you can rerun intel gathering etc. image

kawaiipantsu commented 2 years ago

SPF traverse :D That was something - But i think the end-result was okay ?? With a little SPF note function that can add a note on spf records to make it more readable for non-spf players :) image

kawaiipantsu commented 2 years ago

Forgotten to add DMARC on the list. So this is added after MX and before SPF. Just as a short little segment.

kawaiipantsu commented 2 years ago

Now with proper DMARC lookup and explenations image

kawaiipantsu commented 2 years ago

Test screenshot of fingerprinting in the TXT section. Any fingerprints that matches will output the vendor service instead of the "vendor verification string" Any unknown fingerprints will just show the original "vendor verification string" image