Subdomain Enumuration

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 5

SUBDOMAIN ENUMURATION

1. Subdomain enumeration:
It is the process of finding the subdomains to enlarge the
attacking surface of the particular domains , the subdomains may have the
more possibility of vulnerability .
Techinques:
1. Google dorks
2. Virus Total
3. DNSDumpster
4. CRT.SH
5. Nmmapper
6. Pentest-tools
7. Spyse

1)Google dorks:
It is a hacker technique that uses Google Search and
other Google applications to find security holes in the configuration and
computer code that websites are using.
Example:
 filetype:
to find the particular filetype
Site:amazon.in filetype:pdf
 site: will show the list of web pages that have links to the
specified URL

2)virus total:
It is a website to find malicious file, but under “related” section a
list of subdomains of the mentioned domain is given.
 Example:
Checking the status of cybersapiens.com.au

This is found to be secured .


3)DNSDumpster: to list out the hidden sub domains.

4) CRT.SH:
Used to findout the subdomains.

5)Nmmapper:
6)Pentest-tools:
7)Spyse:

 And other certain tools such as knockpy,subfinder,httpx which are


inbuild in kalilinux are used .

REFERENCE:
1. Subdomain enumeration:
( https://0xffsec.com/handbook/information-gathering/subdomain-enumeration/ )
2. Google dorks:
( https://en.wikipedia.org/wiki/Google_hacking )

3. Virus Total:
( https://www.virustotal.com/gui/ )
4. DNSDumpster:
( https://dnsdumpster.com/ )
5. CRT.SH:
(https://crt.sh/ )
6. Nmmapper:
(https://www.nmmapper.com/sys/tools/subdomainfinder/ )
7. Pentest-tools:
( https://pentest-tools.com/home )
8. Spyse:
( https://spyse.com/ )

You might also like