A Pentester Guide Subdomains Enumeration PDF
A Pentester Guide Subdomains Enumeration PDF
A penetration tester’s
guide to subdomain
enumeration By: Bharath
Note: This document is not created by a professional content writer so any mistake and
error is a part of great design
Disclaimer
credit, it’s mentioned on the first page. The information provided herein is for
educational purposes only and does not constitute legal or professional advice. While
we have made every effort to ensure the accuracy and reliability of the information
reliance you place on the information contained in this document is strictly at your
own risk. VIEH Group shall not be liable for any damages arising from the use of or
reliance on this document. also we highly appreciate the source person for this
document.
Happy reading !
Introduction
As a penetration tester or a bug bounty hunter, most of the times you
are given a single domain or a set of domains when you start a security
the target organisation so that you can increase your chances of finding
vulnerabilities.
A gitbook will be released as a follow up for this blog post on the same
The famous Yahoo! Voices hack happened due to a vulnerable application deployed on a
yahoo.com sub-domain
you might want to check for any additional results apart from
2. There are a lot of the third party services that aggregate massive
a given domain.
search engines that collect the CT logs and let’s anyone search through
1. https://crt.sh/
2. https://censys.io/
3. https://developers.facebook.com/tools/ct/
4. https://google.com/transparencyreport/https/ct/
logs data using postgres interface. This makes it easy and flexible to run
using CT log search engines. The scripts are available in our github repo
domains/sub-domains.
results_output.txt
valid domains.
https://asn.cymru.com/cgi-bin/whois.cgi
http://bgp.he.net/
https://nmap.org/nsedoc/scripts/targets-asn.html
netblocks.txt
passes a copy of full or part of it’s zone file to another DNS server.
Successful zone transfer using DIG tool against a nameserver for a domain
domains in that zone. You can learn more about this technique
from here.
For DNSSEC zones that use NSEC records, zone walking can be
9. There are projects that gather Internet wide scan data and make
the effort.
sources and then sending an ANY query for each domain. The
https://scans.io/data/rapid7/sonar.fdns_v2/20170417-
fdns.json.gz | pigz -dc | grep “.icann.org” | jq
compared the results. The bar chart below shows the number of
References
https://github.com/appsecco/bugcrowd-levelup-subdomain-
enumeration
https://blog.appsecco.com/open-source-intelligence-gathering-
101-d2861d4429e3
https://www.databreaches.net/hackers-post-450k-credentials-
apparently-pilfered-from-yahoo/
http://info.menandmice.com/blog/bid/73645/Take-your-DNSSEC-
with-a-grain-of-salt
https://www.peerlyst.com/posts/bsideslv-2017-breaking-ground-
with-underflow-bsides-las-vegas
-----x-----