Subdomain Enumeration

Blog Posts / References / Presentations / Videos:

  1. Video - OSINT for Proactive Defense - Shubam Mittal - https://www.youtube.com/watch?time_continue=1301&v=0s2nmOZKQY8arrow-up-right

  2. Converter.sh, a bash script to convert domain lists to resolved IP lists without duplicates - https://gist.github.com/xdavidhu/07457247b9087dea4ddaf52858500ccearrow-up-right

Tools:

  1. CC.py - Extracting URLs of a specific target based on the results of "commoncrawl.org" - https://github.com/si9int/cc.pyarrow-up-right

  2. A new generation of tool for discovering subdomains( ip , cdn and so on) - https://github.com/yanxiu0614/subdomain3arrow-up-right

  3. Fetch known urls from AlienVault's Open Threat Exchange for given hosts - https://github.com/lc/otxurlsarrow-up-right

  4. Fetch known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, and Common Crawl. - https://github.com/lc/gauarrow-up-right

  5. CTFR - Abusing Certificate Transparency logs for getting HTTPS websites subdomains. -https://github.com/UnaPibaGeek/ctfrarrow-up-right

  6. suip.biz - no need to install tools

  7. subscraper

  8. Domainbigdata

Twitter Thread / Bugbounty Tips:

Subdomain Bruteforce - #ffufarrow-up-right@ngkogkosarrow-up-right@joohoiarrow-up-right@Jhaddixarrow-up-right Subdomain bruteforce with ffuf on 443 port. It works fine ffuf -u https://FUZZ.rootdomain.comarrow-up-right -w jhaddixall.txt -v | grep "| URL | " | awk '{print $4}'34578

Horizontal domain correlation https://viewdns.info/reversewhois/arrow-up-right - Free https://domaineye.com/reverse-whoisarrow-up-right - Free https://reversewhois.ioarrow-up-right - Free https://whoxy.comarrow-up-right - Free web, not free API. http://reversewhois.domaintools.comarrow-up-right - Not free https://drs.whoisxmlapi.com/reverse-whois-search…arrow-up-right - Not Free https://domainiq.comarrow-up-right - Not Free

arrow-up-rightVhost writeup - https://medium.com/@meraid.kr/how-i-solved-hackerone-h1-212-ctf-e6d7171a55e6arrow-up-right

Last updated