🌐
Subdomain Enumeration Guide
  • Home 🏠
  • Introduction
    • What's the need ?🤔
    • Prerequisites
  • Types
    • Horizontal Enumeration
    • Vertical Enumeration
  • Passive Techniques
    • Passive Sources
    • Certificate Logs
    • Recursive Enumeration
  • Active Techniques
    • DNS Bruteforcing
    • Permutation/Alterations
    • Scraping(JS/Source code)
    • Google analytics
    • TLS, CSP, CNAME Probing
    • VHOST probing
  • Web probing
  • Automation 🤖
Powered by GitBook
On this page
  • ReconFTW
  • Installation:
  • Running ReconFTW:
  • Taking Subdomain Enumeration to next level 🚀 🚀
  • Axiom 🤍
  • How does axiom work?
  • Installation:
  • Usage:

Was this helpful?

Automation 🤖

PreviousWeb probing

Last updated 3 years ago

Was this helpful?

It would be difficult for a person to perform all the above-mentioned techniques. Hence, we need to rely on some kind of tool to automate such intensive steps. Wouldn't it be good if we just had to give our target name BOOM !!💥 the tool performs subdomain enumeration via all these techniques?

  • Language: Bash

Yess this tool outperforms the work of subdomain enumeration via 6 unique techniques. Currently if configured well, gives the most number of subdomains compared to any other open-source tool 🚀 . Let's take a look at the enumeration techniques it performs:-

Installation:

git clone https://github.com/six2dez/reconftw
cd reconftw/
./install.sh

Running ReconFTW:

  • ReconFTW has a -s flag that performs subdomain enumeration & web probing.

  • Also, you can provide your own wordlist for bruteforcing by specifying them in the reconftw config file.

  • Highly recommended that you run this tool in a VPS.

./reconftw.sh -d example.com -s

Flags:

  • d - target domain

  • s - Perform subdomain enumeration

Tip: 🧙♂ Using --deep mode will run more time taking steps but return more subdomains

Taking Subdomain Enumeration to next level 🚀 🚀

The biggest fear while performing subdomain enumeration is that the public DNS resolvers we are using should give us a ban/timeout as we are querying them at a high rate for a prolonged period of time. Since we would be querying the public resolvers using our single VPS IP address they might give us a ban. But what we perform the same task by distributing the workload amongst several VPS instances? The chances of a ban would be less right? Also, the execution time would be considerably less right?

That's when Axiom comes to the rescue.

  • Language: Bash

  • Supports: Digital Ocean, Linode, Azure, GCP, IBM

Axiom is a dynamic infrastructure that helps to distribute the workload of a single task equally among several cloud instances. A perfect tool while performing mass recon. You will first need to install Axiom on your VPS/system from where you will be able to spin up/down the cloud instances.

How does axiom work?

Let's consider want to perform DNS bruteforcing. For this first, you will need to initialize a fleet of instances. This can be any number of instances you want/authorize to make. Within a matter of 4-5 minutes that many instances would be initialized and ready to accept your commands.

Steps:

  1. Divide the bruteforce wordlist into equal number(total number of instances) of parts

  2. Transfer each part to the respective instances

  3. Perform standalone execution in separate instances

  4. Merge the output results from all instances

  5. Create a single output

Installation:

  • Axiom has an interactive installer that will first ask for your cloud provider, API key, which provision to install, which region to choose, default instance size, etc.

git clone https://github.com/pry0cc/axiom ~/.axiom/
$HOME/.axiom/interact/axiom-configure

Some stats: 📊

Task

Axiom (15 instances) ✅

Single VPS (4cpu/8gb)

DNS bruteforcing (11M wordlist)

1m 16s

10m 28s

Web probing (50k subdomains)

1m 40s

21m 22s

Yes, it's possible to integrate Axiom in ReconFTW. Isn't that great? Do try this out !!😍

Usage:

  • It's necessary to first install ReconFTW first on your controller/main system and then install/setup axiom.

  • Before running ReconFTW over Axiom it's recommended that you first initialize your fleet.

  • The thing to note here is to run ReconFTW over Axiom you have to use another script called reconftw_axiom.sh

axiom-fleet testy -i=30
axiom-select 'testy*'
./reconftw_axiom.sh -d example.com -s

Liked my work? Don't hesitate to buy me a coffee XDD

Author:

Passive Enumeration ( , , , , , , , , and )

Certificate transparency (, and )

Bruteforce ()

Permutations ()

JS files & Source Code Scraping (, )

DNS Records () 🤖

The script installs all the required dependencies and tools required.

Out of all the 6 techniques if we want to skip any step we can do it through its file. Just set the value of a particular function to false

🤍

Author:

❤💙💚 💚 💙 ❤

six2dez
subfinder
assetfinder
amass
findomain
crobat
waybackurls
github-subdomains
Anubis
gauplus
mildew
ctfr
tls.bufferover
dns.bufferover
puredns
DNScewl
gospider
analyticsRelationship
dnsx
installer
config
Axiom
pyrocc
https://www.buymeacoffee.com/siddheshparab
ReconFTW