What's the need ?🤔
Last updated
Was this helpful?
Last updated
Was this helpful?
Subdomain enumeration is an essential step in the reconnaissance phase of any Web Application's security assessment. It involves discovering subdomains associated with a root domain. As defined by RFC 1034, "a domain is considered a subdomain of another if it exists within that domain's hierarchy".
Performing subdomain enumeration via various intensive techniques can help enlarge your attack surface, as you get more assets to find vulnerabilities on.
A good subdomain enumeration will help you find those hidden/untouched subdomains, resulting lesser people finding bugs on that particular domain. Hence lesser duplicates.
Finding applications running on hidden, forgotten(by the organization) sub-domains may lead to uncovering critical vulnerabilities.
Discovering such strangely named subdomains is a critical skill, each bug hunter should possess in today's time.
For large organizations, to find what services have they exposed to the internet while performing an internal pentest.
A Fully Qualified Domain Name (FQDN) is the complete domain name for a specific computer, or host, on the network.
An FQDN looks like this:-
myhost.example.com.
----> Fully Qualified Domain Name
myhost
----> is the host located within the domain example.com (subdomain)
Hence; https://example.com http://myhost.example.com https://internal.accounts.example.com http://internal.accounts.dashboard.example.com
The above-mentioned cannot be called as subdomains. They are actually hyperlinks to web applications hosted on the respective systems. Most people have a misconception that these are subdomains of a particular target.
Let's consider an example, admin.example.com
is a subdomain on which there isn't any web service hosted. This means that, when we send web probes to admin.example.com
using httpx/httprobe (tools that check whether any web service is running on that host), we won't be getting any response back.
This doesn't mean that admin.example.com
is not a valid subdomain of root domain example.com
There may exists other services like SSH, SMTP, SMB, WinRM(non-web) hosted on that subdomain that cannot be accessed through your web browser(HTTP). Surprisingly the services running on them may be vulnerable and one cannot rule them-out of their scope.
Hence, its always recommended to DNS resolve your subdomains rather than trying to perform a HTTP resolution in order to get the live subdomains. Once, you have got the list of live subdomains later you can send them for web probing(httpx/httprobe) which would yield out subdomains that have web applications running on them.
More the subdomains = More assets to look for vulnerabilities
The methodology of collecting subdomains from tools like amass, subfinder, findomain and directly sending them to httpx/httprobe is a wrong approach. Instead, you should first DNS resolve them using tools like puredns or shuffledns.