Subdomain enumeration

Via manual OSINT

CRT.SH

A simple request to https://crt.sh/ (a website which lists valid TLS/SSL certificates for publically accessible websites) using the domain name of our target website could yield results.

Google Dorking

The Google search engine lets us use "dorks", which are additional characters or formatting that allow us to narrow down our search. A good example would be the "site:" dork, which will only show us results relevant to the specific domain name we gave it. Knowing this, combining our known domain with a wildcard operator would yield results. Example : site:"*.laposte.fr"

Via automated tools

DNSRecon

dnsrecon -t brt -d target.whatever

Sublist3r

sublist3r.py -d target.whatever

Fuff

ffuf -w /usr/share/wordlists/SecLists/Discovery/DNS/namelist.txt -H "Host: FUZZ.target.whatever" -u http://target_ip -fs {size_of_the_average_response}

Last updated

Was this helpful?