fierce
Enumerate domain subdomains and hostnames
SYNOPSIS
fierce [-h] [-d DOMAIN] [-D DOMAIN_FILE] [-w WORDLIST] [-f RESOLVER_FILE] [-r RANGE] [-dns SERVERS] [-s IP] [-t THREADS] [-v] [-V] [-debug]
PARAMETERS
-h, --help
Display help and exit.
-d, --domain DOMAIN
Target domain for subdomain scan.
-D, --domain-file DOMAIN_FILE
File containing list of domains to scan.
-w, --wordlist WORDLIST
Custom wordlist file for brute-forcing subdomains.
-f, --file RESOLVER_FILE
File with DNS resolver IP addresses.
-r, --range RANGE
IP range (CIDR) to scan for reverse lookups.
-dns SERVERS
Comma-separated list of DNS servers to query.
-s IP
Single IP address for reverse lookup.
-t THREADS
Number of threads (default: 15).
-v
Enable verbose output.
-V
Display version information.
-debug
Enable debug mode for troubleshooting.
DESCRIPTION
Fierce is a Perl-based reconnaissance tool designed for rapid subdomain enumeration against a target domain. It performs brute-force attacks using a customizable wordlist to guess subdomains, queries specified DNS servers, and identifies valid hosts by checking for NXDOMAIN responses or successful resolutions. Unlike slower tools, Fierce leverages existing DNS infrastructure for speed, making it efficient for large-scale scans.
It supports features like IP range scanning, virtual host detection via HTTP requests, and threading for parallelism. Ideal for penetration testing and security assessments, it helps uncover hidden subdomains that could reveal attack surfaces. Fierce skips obvious wildcards and focuses on real hits, outputting results in a clean format for further analysis.
Developed with efficiency in mind, it requires minimal dependencies (primarily Perl's Net::DNS) and runs on Linux distributions like Kali. Users must provide a domain and optionally a wordlist; default lists target common subdomains. Always use with permission, as unauthorized DNS queries may violate terms of service or laws.
CAVEATS
Use only on domains you own or have explicit permission to scan; aggressive use may trigger rate-limiting or IDS alerts. Not for production DNS servers. Requires Perl and Net::DNS module.
EXAMPLE USAGE
fierce -dns 8.8.8.8 -wordlist dict.txt -t 50 example.com
Scans example.com using Google DNS, custom dict, 50 threads.
OUTPUT FORMAT
Results show subdomain, IP, and confidence level (e.g., 'www.example.com - 93.184.216.34 (HIGH)').
HISTORY
Created by RSnake (Ryan Smith) in 2006 as a fast alternative to slow DNS tools. Initially hosted on HackersForCharity.org, now maintained on GitHub. Widely used in Kali Linux toolsuite since early versions; updates focus on compatibility and performance.


