05 March 2012

BackTrack tool review: ReverseRaider

Note: This is part of a series on BackTrack 5 tool reviews. It is not meant to be an exhaustive analysis of any tool, just a demonstration of the tool using real-world targets.


links: [ help page | interpol.int scan results ]

root@bt:/pentest/enumeration/reverseraider# ./reverseraider
ReverseRaider domain scanner v0.7.7 - Acri Emanuele (crossbower@gmail.com)
Usage:
  reverseraider -d domain | -r range [options]
Options:
  -r range of ipv4 or ipv6 addresses, for reverse scanning
    examples: 208.67.1.1-254 or 2001:0DB8::1428:57ab-6344
  -f file containing lists of ip addresses, for reverse scanning
  -d domain, for wordlist scanning (example google.com)
  -w wordlist file (see wordlists directory...)
Extra options:
  -t requests timeout in seconds
  -P enable numeric permutation on wordlist (default off)
  -D nameserver to use (default: resolv.conf)
  -T use TCP queries instead of UDP queries
  -R don't set the recursion bit on queries

interpol.int scan results:


root@bt:/pentest/enumeration/reverseraider# ./reverseraider -d interpol.int -r 193.22.7.1-127 -w /pentest/enumeration/reverseraider/wordlists/word.list 
md.interpol.int                 193.22.7.82
md.interpol.int                 193.22.7.81
M.interpol.int                   193.22.7.84
M.interpol.int                   193.22.7.83
www.interpol.int                 193.22.7.1
m.interpol.int                   193.22.7.83
m.interpol.int                   193.22.7.84
cyber.interpol.int               193.22.7.62
ems.interpol.int                 193.22.7.40
www.interpol.int                 193.22.7.1
CYBER.interpol.int               193.22.7.62
Post a Comment