View Issue Details

IDProjectCategoryView StatusLast Update
0003442Kali Linux[All Projects] Queued Tool Additionpublic2019-10-28 16:23
Reporterlaned Assigned To 
PrioritynormalSeverityfeatureReproducibilityalways
Status assignedResolutionopen 
Product Version 
Target VersionFixed in Version 
Summary0003442: Bluto - DNS Recon | SubDomain Brute Forcer | DNS Zone Transfer | DNS Wild Card Checks | DNS Wild Card Brute Forcer
DescriptionBluto is capable of:

DNS Recon | SubDomain Brute Forcer | DNS Zone Transfer | DNS Wild Card Checks | DNS Wild Card Brute Forcer | Email Enumeration | Staff Enumeration | Compromised Account Checking

Below is a snippet from the git page as a introduction the tool. It would be great to get this into Kali as its been found to be very useful to the security community.

Bluto has gone through a large code base change and various feature additions have been added since its first day on the job. Now that RandomStorm has been consumed and no longer exists, I felt it time to move the repo to a new location. So from this git push onwards Bluto will live here. I hope you enjoy the new Bluto.

The target domain is queried for MX and NS records. Sub-domains are passively gathered via NetCraft. The target domain NS records are each queried for potential Zone Transfers. If none of them gives up their spinach, Bluto will attempt to identify if SubDomain Wild Cards are being used. If they are not Bluto will brute force subdomains using parallel sub processing on the top 20000 of the 'The Alexa Top 1 Million subdomains' If Wild Cards are in place, Bluto will still Brute Force SubDomains but using a different technique which takes roughly 4 x longer. NetCraft results are then presented individually and are then compared to the brute force results, any duplications are removed and particularly interesting results are highlighted.

Bluto now does email address enumeration based on the target domain, currently using Bing and Google search engines plus gathering data from the Email Hunter service and LinkedIn. https://haveibeenpwned.com/ is then used to identify if any email addresses have been compromised. Previously Bluto produced a 'Evidence Report' on the screen, this has now been moved off screen and into an HTML report.

Search engine queries are configured in such a way to use a random User Agent: on each request and does a country look up to select the fastest Google server in relation to your egress address. Each request closes the connection in an attempt to further avoid captchas, however exsesive lookups will result in captchas (Bluto will warn you if any are identified).

Bluto requires various other dependencies. So to make things as easy as possible, pip is used for the installation. This does mean you will need to have pip installed prior to attempting the Bluto install.

Bluto now takes command line arguments at launch, the new options are as follows;

-e This uses a very large subdomain list for bruting. -api You can supply your email hunter api key here to gather a considerably larger amount of email addresses.
Steps To ReproducePip Install Instructions

Note: To test if pip is already installed execute.

pip -V

(1) Mac and Kali users can simply use the following command to download and install pip.

curl https://bootstrap.pypa.io/get-pip.py -o - | python

Bluto Install Instructions

(1) Once pip has successfully downloaded and installed, we can install Bluto:

sudo pip install git+git://github.com/darryllane/Bluto

(2) You should now be able to execute 'bluto' from any working directory in any terminal.

bluto

Upgrade Instructions

(1) The upgrade process is as simple as;

sudo pip install git+git://github.com/darryllane/Bluto --upgrade
Additional Informationhttps://github.com/darryllane/Bluto

for more details.

Relationships

duplicate of 0002980 closedg0tmi1k Potentially Add 'Bluto' into Kali 

Activities

laned

2016-07-22 15:55

reporter  

Bluto-2.1.zip (874,741 bytes)

laned

2016-10-27 15:57

reporter   ~0006079

Latest Version (more features) https://github.com/darryllane/Bluto

laned

2017-01-06 16:32

reporter   ~0006223

are there any updates to this?

laned

2017-02-27 09:16

reporter   ~0006454

HI, any idea roughly when I will get an update?

g0tmi1k

2018-01-29 10:07

administrator   ~0007896

To help speed up the process of evaluating the tool, please make sure to include the following information (the more information you include, the more beneficial it will for us):

- [Name] - The name of the tool
- [Version] - What version of the tool should be added?
--- If it uses source control (such as git), please make sure there is a release to match (e.g. git tag)
- [Homepage] - Where can the tool be found online? Where to go to get more information?
- [Download] - Where to go to get the tool?
- [Author] - Who made the tool?
- [Licence] - How is the software distributed? What conditions does it come with?
- [Description] - What is the tool about? What does it do?
- [Dependencies] - What is needed for the tool to work?
- [Similar tools] - What other tools are out there?
- [How to install] - How do you compile it?
- [How to use] - What are some basic commands/functions to demonstrate it?

laned

2018-01-29 11:14

reporter   ~0007960

Thanks for coming back to me Will run through it all tonight

g0tmi1k

2019-10-28 13:34

administrator   ~0011240

Please could this be packaged

laned

2019-10-28 16:13

reporter   ~0011255

Latest Pypi Release: pip install Bluto==2.4.16.post1
Latest Git Release: https://github.com/darryllane/Bluto/releases

Is there anything else you require from me?

laned

2019-10-28 16:23

reporter   ~0011256

- [Name]:
Bluto

- [Version]:
2.4.16

- [Homepage]:
https://github.com/darryllane/Bluto
https://n0where.net/dns-analysis-tool-bluto
https://darryllane.co.uk/bluto-the-history

- [Download]:
Latest Pypi Release: pip install Bluto==2.4.16.post1
Latest Git Release: https://github.com/darryllane/Bluto/releases

- [Author]:
Darryl Lane

- [Licence]:
GNU General Public License v3.0

- [Description]:
DNS Recon | Brute Forcer | DNS Zone Transfer | DNS Wild Card Checks | DNS Wild Card Brute Forcer | Email Enumeration | Staff Enumeration | Compromised Account Enumeration | MetaData Harvesting

- [Dependencies]:
"docopt",
"dnspython",
"termcolor",
"BeautifulSoup4",
"requests[security]",
"pythonwhois",
"lxml",
"oletools",
"pdfminer==20140328"

- [Similar tools]:
DNSRecon
DNSenum
Dig
Host
Fierce

- [How to install]:
pip install Bluto==2.4.16.post1

- [How to use]:
bluto --domain target.com

Issue History

Date Modified Username Field Change
2016-07-22 15:55 laned New Issue
2016-07-22 15:55 laned File Added: Bluto-2.1.zip
2016-07-22 16:08 g0tmi1k Relationship added duplicate of 0002980
2016-07-22 16:09 g0tmi1k Summary Introduce new tool into kali distro => Bluto - Introduce new tool into kali distro
2016-08-17 12:52 muts Assigned To => sbrun
2016-08-17 12:52 muts Status new => assigned
2016-10-27 15:57 laned Note Added: 0006079
2017-01-06 16:32 laned Note Added: 0006223
2017-02-27 09:16 laned Note Added: 0006454
2018-01-29 10:07 g0tmi1k Priority high => normal
2018-01-29 10:07 g0tmi1k Summary Bluto - Introduce new tool into kali distro => Bluto - DNS Recon | SubDomain Brute Forcer | DNS Zone Transfer | DNS Wild Card Checks | DNS Wild Card Brute Forcer
2018-01-29 10:07 g0tmi1k Note Added: 0007896
2018-01-29 11:14 laned Note Added: 0007960
2018-02-21 09:35 g0tmi1k Product Version kali-dev =>
2019-04-15 12:29 sbrun Assigned To sbrun =>
2019-04-15 12:29 sbrun Status assigned => new
2019-10-28 13:35 g0tmi1k Note Added: 0011240
2019-10-28 13:35 g0tmi1k Category New Tool Requests => Queued Tool Addition
2019-10-28 16:01 g0tmi1k Status new => assigned
2019-10-28 16:13 laned Note Added: 0011255
2019-10-28 16:23 laned Note Added: 0011256