diff --git a/sublist3r.py b/sublist3r.py index 760e5ce..b595ac5 100755 --- a/sublist3r.py +++ b/sublist3r.py @@ -611,7 +611,7 @@ def check_host(self, host): Resolver.nameservers = ['8.8.8.8', '8.8.4.4'] self.lock.acquire() try: - ip = Resolver.query(host, 'A')[0].to_text() + dns.resolver.Resolver.resolve() if ip: if self.verbose: self.print_("%s%s: %s%s" % (R, self.engine_name, W, host)) @@ -693,21 +693,6 @@ def send_req(self, url): return self.get_response(resp) - # once the send_req is rewritten we don't need to call this function, the stock one should be ok - def enumerate(self): - while self.url != '': - resp = self.send_req(self.url) - resp = json.loads(resp) - if 'error' in resp: - self.print_(R + "[!] Error: Virustotal probably now is blocking our requests" + W) - break - if 'links' in resp and 'next' in resp['links']: - self.url = resp['links']['next'] - else: - self.url = '' - self.extract_domains(resp) - return self.subdomains - def extract_domains(self, resp): #resp is already parsed as json try: @@ -919,7 +904,6 @@ def main(domain, threads, savefile, ports, silent, verbose, enable_bruteforce, e 'ask': AskEnum, 'netcraft': NetcraftEnum, 'dnsdumpster': DNSdumpster, - 'virustotal': Virustotal, 'threatcrowd': ThreatCrowd, 'ssl': CrtSearch, 'passivedns': PassiveDNS @@ -930,7 +914,7 @@ def main(domain, threads, savefile, ports, silent, verbose, enable_bruteforce, e if engines is None: chosenEnums = [ BaiduEnum, YahooEnum, GoogleEnum, BingEnum, AskEnum, - NetcraftEnum, DNSdumpster, Virustotal, ThreatCrowd, + NetcraftEnum, DNSdumpster, ThreatCrowd, CrtSearch, PassiveDNS ] else: