Basics:

ig if i wanna start with the absolute basics, we’ll have to learn what subdomains are in the first place:

2 ways to do it. active and passive enumeration.

passive enumeration:

  • Querying public DNS records (A, AAAA, CNAME, MX)
  • cert tracking with stuff like crt.sh
  • dorking, public archives and social media ig

active enumeration:

  • brute-forcing with a wordlist
  • in some cases misconfigured DNS servers may allow a DNS zone transfer (AXFR) and reveal all records for a domain including subdomains
  • sublist3r, amass

tools:

  • sublist3r
  • OWASP amass
  • dnsenum / dnsrecon
  • SecurityTrails
  • crt.sh
  • google fu

notes:

  • some domains use wildcard records that can return false positives by resolving non existent subdomains.
  • aggressive querying can trigger rate limits or be flagged as malicious activity
  • when combining data collected from multiple sources, its important to effectively filter and validate to identify actual relevant subdomains

process: