SUBDOMAIN ENUMERATION
Subdomain enumeration is the process of finding subdomains within a website. This can be achieved via brute force, open source intelligence (OSINT) or virtual hosts. This 0xffsec subdomain enumeration handbook may be of use
Some examples of effective OSINT for subdomain enumeration are:
- Certificate Transparency
- Google Dorking
- DNS Aggregators - https://dnsdumpster.com/
- Passive and Active enumeration tools
OSINT - Certificate Transparency
SSL/TLS (Secure /Sockets Layer/Transport Layer Security) certificates are created for a domain by a CA (Certificate Authority). When these are made, the CA records the certificates in certificate transparency logs, which are publicly available. This can be used as part of a pen test by checking the logs for any subdomains that have been registered. Sites like https://crt.sh and https://ui.ctsearch.entrust.com/ui/ctsearchui offer databases that can be searched.
The example below shows the logs for domain names added to https://tryhackme.com
gobuster dns -t 30 -w [wordlist] -d [ip]
Comments
Post a Comment