Overview
This lecture explains various subdomain enumeration techniques for security reconnaissance, highlighting methods, tools, and platforms to uncover hidden assets for ethical hacking.
Subdomain Discovery Techniques
- CRT.sh enables discovery of recent and historical subdomains by querying their certificate transparency logs.
- Use simple scripts and the
sort
command to filter and deduplicate subdomain lists from CRT.sh.
- Project Discovery’s Chaos platform allows direct downloads of subdomains from bug bounty scopes and public sources, with a CLI for automation.
- Altrax tool with Chaos generates subdomain permutations beyond existing entries.
- Utilize Seclists’ DNS wordlists to create keyword-based permutations for broader coverage.
- DNSX and HTTPX tools confirm which subdomains are live and active.
Automated and Advanced Methods
- Amass provides comprehensive passive subdomain enumeration; use specific commands for clean, unique outputs and try active scans as needed.
- ASN-based discovery uses Amass intel to identify organization’s ASN and IP ranges, revealing associated domains often missed.
- GitHub Subdomains tool scrapes public GitHub repos for subdomains, storing results for later analysis (GitHub API key recommended).
- The Wayback Machine’s CDX API retrieves archived, potentially forgotten subdomains.
- VirusTotal API can fetch subdomains and IPs, followed by HTTPX for live host identification.
- Alien Vault and URLScan facilitate the discovery and validation of domains and IPs, combinable with DNSX/HTTPX.
Brute Forcing and Uncommon Tactics
- Use FFUF for subdomain brute-forcing with custom wordlists to find non-indexed or hidden subdomains; apply rate limiting to avoid server blocks.
- WHOIS lookup identifies registered emails; reverse WHOIS services find all domains tied to an email for expanded reconnaissance.
- Export discovered domains and use HTTPX to detect which are live for further manual investigation.
Post-Enumeration Steps
- Scan all popular ports (not just 80, 443) with HTTPX to identify services like dashboards and admin panels.
- Aquatone automates homepage screenshotting to visually inspect a large number of targets.
- Nuclei automates vulnerability scanning by setting batch size and concurrency for rapid, parallel analysis.
Key Terms & Definitions
- Subdomain Enumeration — The process of identifying all subdomains associated with a primary domain.
- Passive Source — Information obtained without directly interacting with the target domain.
- Brute Forcing — Systematically guessing subdomains using wordlists.
- ASN (Autonomous System Number) — Unique identifier for a network on the internet, useful for finding related assets.
Action Items / Next Steps
- Practice each subdomain enumeration method with proper authorization.
- Review the use of DNSX, HTTPX, Aquatone, and Nuclei for post-enumeration.
- Await the upcoming recon checklist article for advanced methodology details.