Active Subdomain Enumeration
Assetfinder
assetfinder example.com
Enumerate multiple domains with assetfinder from a single file
nano domains.txt
example1.com
example2.com
example3.com
assetfinder < domains.txt
Enumerate multiple domains with assetfinder a single file and .txt output for each domain.
nano enumerate_subdomains.sh
#!/bin/bash
# Read each domain from domains.txt
while IFS= read -r domain; do
echo "Enumerating subdomains for $domain..."
assetfinder "$domain" > "$domain.txt"
echo "Results saved to $domain.txt"
done < domains.txt
chmod +x enumerate_subdomains.sh
./enumerate_subdomains.sh

ZoneTransfer
ZoneTransfers - https://hackertarget.com/zone-transfer/
The zone transfer is how a secondary DNS server receives information from the primary DNS server and updates it.
Manual approach
Identifying Namservers -
nslookup -type=NS zonetransfer.me
Testing for ANY and AXFR Zone Tranfer -
nslookup -type=any -query=AXFR zonetransfer.me nsztm1.digi.ninja
If we manage to perform a successful zone transfer for a domain, there is no need to continue enumerating this particular domain as this will extract all the available information.
Gobuster
Gobuster is a tool that we can use to perform subdomain enumeration. It is especially interesting for us the patterns options as we have learned some naming conventions from the passive information gathering we can use to discover new subdomains following the same pattern.
lert-api-shv-{GOBUSTER}-sin6
atlas-pp-shv-{GOBUSTER}-sin6
export TARGET="[example.com](<http://example.com/>)"
export NS="[d.ns.example.com](<http://d.ns.example.com/>)"
export WORDLIST="numbers.txt"
gobuster dns -q -r "${NS}" -d "${TARGET}" -w "${WORDLIST}" -p ./patterns.txt -o "gobuster_${TARGET}.txt"
dns
: Launch the DNS moduleq
: Don't print the banner and other noise.r
: Use custom DNS serverd
: A target domain namep
: Path to the patterns filew
: Path to the wordlisto
: Output file
Last updated