Skip to content

Commit

Permalink
Merge pull request HatBashBR#19 from xxdesmus/master
Browse files Browse the repository at this point in the history
Fixing CloudFlare -> Cloudflare typos
  • Loading branch information
m0rtem authored Dec 4, 2017
2 parents 60614d3 + 86985bb commit 6fdd1d6
Show file tree
Hide file tree
Showing 2 changed files with 5 additions and 5 deletions.
4 changes: 2 additions & 2 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@

https://sploit.io/2017/08/12/cloudfail-a-tactical-dns-reconnaissance-tool/

CloudFail is a tactical reconnaissance tool which aims to gather enough information about a target protected by CloudFlare in the hopes of discovering the location of the server. Using Tor to mask all requests, the tool as of right now has 3 different attack phases.
CloudFail is a tactical reconnaissance tool which aims to gather enough information about a target protected by Cloudflare in the hopes of discovering the location of the server. Using Tor to mask all requests, the tool as of right now has 3 different attack phases.

1. Misconfigured DNS scan using DNSDumpster.com.
2. Scan the Crimeflare.com database.
Expand All @@ -13,7 +13,7 @@ CloudFail is a tactical reconnaissance tool which aims to gather enough informat
> Please feel free to contribute to this project. If you have an idea or improvement issue a pull request!
#### Disclaimer
This tool is a PoC (Proof of Concept) and does not guarantee results. It is possible to setup CloudFlare properly so that the IP is never released or logged anywhere; this is not often the case and hence why this tool exists.
This tool is a PoC (Proof of Concept) and does not guarantee results. It is possible to setup Cloudflare properly so that the IP is never released or logged anywhere; this is not often the case and hence why this tool exists.
This tool is only for academic purposes and testing under controlled environments. Do not use without obtaining proper authorization
from the network owner of the network under testing.
The author bears no responsibility for any misuse of the tool.
Expand Down
6 changes: 3 additions & 3 deletions cloudfail.py
Original file line number Diff line number Diff line change
Expand Up @@ -84,23 +84,23 @@ def dnsdumpster(target):
if res['dns_records']['host']:
for entry in res['dns_records']['host']:
provider = str(entry['provider'])
if "CloudFlare" not in provider:
if "Cloudflare" not in provider:
print_out(
Style.BRIGHT + Fore.WHITE + "[FOUND:HOST] " + Fore.GREEN + "{domain} {ip} {as} {provider} {country}".format(
**entry))

if res['dns_records']['dns']:
for entry in res['dns_records']['dns']:
provider = str(entry['provider'])
if "CloudFlare" not in provider:
if "Cloudflare" not in provider:
print_out(
Style.BRIGHT + Fore.WHITE + "[FOUND:DNS] " + Fore.GREEN + "{domain} {ip} {as} {provider} {country}".format(
**entry))

if res['dns_records']['mx']:
for entry in res['dns_records']['mx']:
provider = str(entry['provider'])
if "CloudFlare" not in provider:
if "Cloudflare" not in provider:
print_out(
Style.BRIGHT + Fore.WHITE + "[FOUND:MX] " + Fore.GREEN + "{ip} {as} {provider} {domain}".format(
**entry))
Expand Down

0 comments on commit 6fdd1d6

Please sign in to comment.