🤬
89 lines | UTF-8 | 4 KB

Subdomain Enumeration Techniques 🔮

1. Certificate Transparency

2. Search Engines

The “Site:” operator which was used to search domain and subdomains was working in the below-mentioned search engines:

  • Google
  • Bing
  • Yahoo
  • Yandex
  • Duckduckgo
  • Aol
     

3. Online DNS Tools

I found 9 sub-domain enumeration services:

4. ASN (Autonomous System Number)

5. Subject Alternate Name (SAN)

  • The multi-domain SSL certificate secures up to 250 unique domain names or subdomains and that domain/subdomains names mentioned in the Subject Alternative Names (SAN) field in the certificate.
  • Tools to extract domain names from SAN: OpenSSL
    Python Script

     

6. Public Dataset (Rapid7)

  • Rapid7 performs Internet scanning to collect Internet-wide scan data and then publish the results publicly for free and some data is paid.
  • Rapid7 Datasets Link: https://opendata.rapid7.com/
     

7. Brute force or Dictionary Attacks

Tools:

  • Aquatone
  • Bluto-Old
  • DNS-Discovery
  • Dnssearch
  • Knock
  • Fierce
  • Subbrute
  • Amass
  • Dnsrecon

8. Zone Transfer

  • DNS zone transfer is the process of replication DNS database or DNS records from the primary name server to the secondary name server.
  • The DNS zone transfer functionality used by an adversary only when the primary name server is configured to replicate the zone information to any server. An adversary acts as a slave and asks the master for a copy of the zone records.

Credit

Based on Lazy Hacker's writeup.
 

Support

You can Follow me on twitter or

Buy Me A Coffee

Please wait...
Page is in error, reload to recover