Working with NUUBI Tool

Example 1: Subnet Lookup of target    

In this example, we will be collecting the information about the Subnet lookup on our target which is w3wiki.org. You can see that we have got Address, Network Range, Netmask, Broadcast etc information from subnet lookup.

python3 nuub.py -s w3wiki.org

Example 2: Subdomain lookup of the target domain

In this example, we are collecting the subdomains of our target. For this collection we are using the -S tag followed by the target URL (w3wiki.org).

Example 3: Find hosts sharing DNS servers

In this example, we will gather the host which is sharing the same DNS Server of w3wiki.org. You can see that we have got No DNS Server Records as result, maybe w3wiki.org doesn’t share their DNS Server with other hosts.

Example 4: HTTP Headers of target URL

In this example, we will with intercepting the HTTP Headers for our target. We have got Status code, Server, Location, Connection, etc.

python3 nuub.py -H w3wiki.org

Example 5: Reverse DNS from the target IP address

In this example, we will be performing Reverse DNS from IP address. You can see that we have provided the IP address of our target and we have got the DNS Name of the associated IP address.

python3 nuub.py --revdns 34.218.62.116

Example 6: Cloudflare cookie scraper

In this example, we will scrape the cookies from our Target Domain.

python3 nuub.py --cookie https://w3wiki.org

In the below screenshot, you can see that we have scraped cookies of w3wiki.org.

Example 7: CMS Detection of Target

In this example, we will be collecting CMS (Content Management System) information. In the Results, we have got the server details and more information.

python3 nuub.py -c w3wiki.org

Example 8: URL and website scanner for potentially malicious websites

In this example, we will scanning the target for any vulnerabilities.

python3 nuub.py --url https://w3wiki.org

Example 9: Crawler target URL

In this example, we will be crawling the target’s metadata which can have some sensitive data hidden.

python3 nuub.py -C w3wiki.org

In the below Screenshot, we have crawled some important URLs from w3wiki.org

Example 10: Certificate Transparency log monitor

In this example, we will be collecting the Certificate Transparency logs from our target domain.

python3 nuub.py --cert w3wiki.org

In the below screenshot, you can see that we have got the information about Certificate Transparency. This information consists of Authority, Issuer, ID, etc.



Nuubi – Tool for Information Gathering, Scanning And Recon

The information gathered or collected in the Reconnaissance phase serves as the milestone for upcoming stages like Scanning, Exploitation, etc. So managing the relevant and sensitive data is always challenging work for every penetration tester. NUBBI is one tool that is used for penetration testing. NUBBI is a Python-language based tool that performs lots of Recon. 

Similar Reads

NUBBI gathers information like :

Performing Banner grabbing Performing Subnetlookup Performing Cms detection Performing Certificate Transparency log monitor Performing  DNS lookup Performing Extract links Recon Performing GeoIP lookup Performing HTTP headers Performing Nmap scan Performing Subdomain lookup Performing Traceroute Scan Finding hosts sharing DNS servers URL and website scanner for potentially malicious websites, etc....

Installation of Nuubi Tool in Kali Linux OS

Step 1: Open up your Kali Linux terminal and move to Desktop using the following command....

Working with NUUBI Tool:

Example 1: Subnet Lookup of target...