Skip to content

Information Gathering - Web Edition Contents
Previous Section

Subdomain Brute-Forcing is the process of testing common subdomain names against the target, by leveraging pre-defined lists of carefully crafted wordlists of potential subdomain names, increasing the efficiency and effectiveness of subdomain discovery.


The Subdomain Brute-Forcing ProcessΒΆ

1) Wordlist SelectionΒΆ

Selecting an effective wordlist is essential and can be categorised into three categories:

Category Description
General-Purpose Board range of common subdomain names. (e.g. dev, staging, blog, mail, admin, test)
Targeted Focused on specific industries, technologies, or naming patterns relevant to the target. Efficient process which reduces the chance of false positives.
Custom Creating custom wordlists based on specific keywords, patterns, or intelligence gathered from other sources.

2) Iteration & QueryingΒΆ

Script or Tool which iterates through the wordlist by appending each word to test as a subdomain. (e.g. domain: example.com to test for subdomain: dev.example.com, staging.example.com, and mail.example.com)

3) DNS LookupΒΆ

A DNS Query is performed on each potential subdomain to check if it resolves to an IP Address (typically by querying for A or AAAA records).

4) Filtering & ValidationΒΆ

In the event a subdomain successfully resolves it is added to a list of valid subdomains, further validation steps can be taken to confirm the subdomain's existence and functionality. (e.g. attempting access through cURL or a web browser to interact with the subdomain.)


Subdomain Brute-Forcing ToolsΒΆ

DNSEnumΒΆ

DNSEnum (Domain Name System Enumeration) a tool used to comprehensively enumerate DNS records, and supports dictionary and brute-force based attacks for discovering subdomains.

FierceΒΆ

Fierce is a user-friendly tool used for recursive subdomain discovery with addition to featuring wildcard detection and an easy-to-use interface.

DNSReconΒΆ

DNSRecon is a versatile tool which combines multiple DNS reconnaissance techniques, and offers a customisable output formats.

AmassΒΆ

Amass actively maintained tool focused on subdomain discovery, known for its integration with other tools, and extensive data sources.

AssertFinderΒΆ

AssertFinder is a simple yet effective tool for locating subdomains utilising various techniques and is ideal for quick, and lightweight scans.

PureDNSΒΆ

PureDNS is aa powerful, and flexible DNS brute-forcing tool, capable of resolving and filtering record results effectively.


DNSEnum More In-DepthΒΆ

DNS Enum (DNS Enumeration) as aforementioned briefly above, is a versatile and widely utilised command-line tool which is written in Perl.

It is not just merely a tool, but a comprehensive toolkit for DNS Reconnaissance, providing numerous utilities in the process of gathering information about a target related to it's DNS infrastructure, and subdomain discovery.

DNSEnum Key FunctionsΒΆ

Key Function Description
DNS Record Enumeration Retrieves various DNS Records including A, AAAA, NS, MX, and TXT records.
Zone Transfer Attempts Automatically attempts Zone Transfers from discovered name servers, while most servers are configured to prevent unauthorised zone transfers, although a successful attempt can reveal a vast amount of DNS information.
Subdomain Brute-Forcing Supports brute-force enumeration of subdomains based on a provided wordlist, which involves systematically testing potential subdomain names against the target to identify valid ones.
Google Scraping The tool can scrape Google search results to find additional subdomains that might not be listed in the DNS records directly.
Reverse Lookup Can perform Reverse DNS Lookups to identify domains associated with a provided IP address which may potentially reveal other websites being hosted on the same server.
WHOIS Lookups Can perform WHOIS queries to gather information about domain ownership and registration details.

ExercisesΒΆ

Q: Using the known subdomains for inlanefreight.com (www, ns1, ns2, ns3, blog, support, customer), find any missing subdomains by brute-forcing possible domain names. Provide your answer with the complete subdomain, e.g., www.inlanefreight.com.
A: my.inlanefreight.com

Next Section