description |
---|
Passive and Active recon |
The goal here is to increase our attack surface.
Can we find lucrative subdomains that will assist in leveraging our attacks?
Example:
If we are targetting apple.com, what if there is a vulnerable web app on dev.apple.com?
Installation (apt):
apt install sublist3r -y
Syntax Usage:
sublist3r -d apple.com
- If the tool is running slow, utilize the -t option and increase the amount of threads
sublist3r -d apple.com -t 100
On this site, the % is a wildcard that is placed before the domain.
Example:
%.apple.com
This is a DNS enumeration tool that assists an attacker in mapping the attack surface of a target through means of external asset discovery.
GitHub Repo:
{% embed url="https://github.com/OWASP/Amass" %}
{% embed url="https://owasp.org/www-project-amass/" %}
{% embed url="https://github.com/tomnomnom/httprobe" %}
This tool will take a list of domains and probe them for alive http/https servers.