0% found this document useful (0 votes)
70 views3 pages

Reconsubdomains

The document outlines various techniques and tools for subdomain enumeration, live host filtering, vulnerability scanning, and web application security assessments. It includes commands for tools like subfinder, amass, httprobe, nmap, and nikto, as well as methods for Google dorking and GitHub reconnaissance. The document serves as a comprehensive guide for conducting security assessments on subdomains and identifying potential vulnerabilities.

Uploaded by

sajibaf839
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
70 views3 pages

Reconsubdomains

The document outlines various techniques and tools for subdomain enumeration, live host filtering, vulnerability scanning, and web application security assessments. It includes commands for tools like subfinder, amass, httprobe, nmap, and nikto, as well as methods for Google dorking and GitHub reconnaissance. The document serves as a comprehensive guide for conducting security assessments on subdomains and identifying potential vulnerabilities.

Uploaded by

sajibaf839
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 3

🔵 All Subdomain 🔵

subfinder -d terget.com -o subfinder.txt


shodanx subdomain -d target.com -ra -o shodax.txt
amass enum -active -norecursive -noalts -d rwa.com -o amass.txt
gobuster dns -d certinia.txt -w /usr/share/wordlists/subdomain_megalist.txt -o
gobuster.txt
curl -s https://crt.sh/\?q\=%.certinia.com\&output\=json | jq -r '.[].name_value' |
sed 's/\*\.//g' | sort -u | tee -a subs_domain.txt

curl -s
https://otx.alienvault.com/api/v1/indicators/hostname/domain.com/passive_dns | jq -
r '.passive_dns[]?.hostname' | grep -E ^[a-zA-Z0-9.-]+.domain.com$ | tee
alienvault_subs.txt

curl -s "https://urlscan.io/api/v1/search/?q=domain:certinia.com&size=10000" | jq -
r '.results[].page.domain' | tee urlscan_subs.txt

curl -s
"http://web.archive.org/cdx/search/cdx?url=*.certinia.com/*&output=json&collapse=ur
lkey" | jq -r '.[1:][].[2]' | grep -Eo "^[a-zA-Z0-9.-]+\.certinia\.com$" | sort -u
| tee webarchive_subs.txt

🔴 Filtering live hosts with httprobe 🔴


cat subs_domain.txt | httprobe -td -title -sc -ip > httprobe_domain.com.txt

cat httprobe_domain.com.txt | awk '{print $1}' > live_subs_domain.com.txt

cat live_subs_domain.com.txt | grep -Ei 'asp|php|jsp|jsx|aspx'

httprobe -l live_subs_domain.com.txt -ports


80,443,8080,8443,8000,8888,8081,8181,3366,5432,6379,27017,15672,10000,9090,5900 --
threads 80
-o alive.txt

🟠 Nmap: 🟠
naabu -l live_subs_domain.com.txt -c 50 -nmaps -o naabuports.txt
sudo nmap -sV -sC -iL live_subs_domain.com.txt --script=vuln

🟢 Nikto: 🟢
nikto -h alive_subdomains.txt -output nikto_results.txt

🍩 Subdomain Takeover: 🍩
subzy run --targets live_subs_domain.com.txt --concurrency 100 --hide_fails --
verify_ssl

🔗 Broken Link Hijacking: 🔗


socialhunter -f alive_subdomains.txt

📸 Screenshotting 📸
eyewitness --web -f alive_subdomains.txt --threads 5 -d screenshots

-----------------------------------------
Nuclei Automated Live Subdomains Spray (with rate limit)
nuclei -l subdomain.txt -rl 10 -bs 2 -as -silent -s critical,high,medium

Finding WAF (web application firewall)


cat httpx_domain.com.txt | grep 403
✅ Subdomains without WAF ✅
cat httpx_domain.com.txt | grep -v -E 'cloudfront|imperva|cloudflare' >
nowaf_subs_domain.com.txt

📍 Visit All Non-WAF Subdomains Manually 📍


cat nowaf_subs_domain.com.txt | grep 403 | awk '{print $1}'

🎯 Prepare the List of 403 Subdomains for Fuzzing 🎯


cat nowaf_subs_domain.com.txt | grep 403 | awk '{print $1}' >
403_subs_domain.com.txt

403 Fuzzing
Default Wordlist Fuzzing
dirsearch -u https://sub.domain.com -x 403,404,500,400,502,503,429 --random-agent

Extension based Fuzzing


dirsearch -u https://sub.domain.com -e
xml,json,sql,db,log,yml,yaml,bak,txt,tar.gz,zip -x 403,404,500,400,502,503,429 --
random-agent

🌟 Next step 🌟
JavaScript analysis 🌐 ---ok

💜 Google Dorking 💜
site:http://drive.google.com inurl:folder
site:http://drive.google.com inurl:open
site:http://docs.google.com inurl:d
site:http://drive.google.com "confidential"
site:http://docs.google.com filetype:docx

site:tesla.com inurl:folder
site:tesla.com inurl:open
site:tesla.com filetype:pdf
site:tesla.com filetype:docx
site:tesla.com inurl:/docs/
site:tesla.com inurl:/files/
site:tesla.com filetype:pptx
site:tesla.com filetype:xlsx

filetype:ini "password" site:orgfiletype:txt "credentials" site:gov


filetype:yaml "secret_key" -examples
filetype:key "PRIVATE KEY"
filetype:pem "PRIVATE KEY"
filetype:log "debug" "error"
filetype:log "Stack trace" site:edu
filetype:log "unable to connect"
filetype:log "authentication failed"
filetype:json "db_password" -github
filetype:db "database" site:org
filetype:sql "INSERT INTO" "VALUES" site:edu
filetype:dump "database" site:gov
"index of" "backup.sql"
filetype:conf "db_user" site:org
filetype:config "ftp" site:gov
filetype:xml "web.config" site:edu
"index of" "settings.json"
filetype:env "SECRET_KEY"
"index of" "api_key"
filetype:json "api_token"
filetype:txt "api_secret"
"admin login" filetype:php
"index of" "server-status"
filetype:php "mysql_connect" site:gov
"admin dashboard" "login"
filetype:pdf "not for distribution" site:gov
filetype:xlsx "confidential report" site:edu
filetype:doc "salary" "employee"
filetype:docx "restricted access"
filetype:xlsx | filetype:xls "username" "password" site:gov
filetype:xlsx | filetype:xls "username" site:gov
filetype:xlsx | filetype:xls "database" site:gov
filetype:xlsx | filetype:xls "financial" site:gov
filetype:xlsx | filetype:xls "password" site:gov
site:dropbox.com "password"
site:box.com "confidential"
site:drive.google.com "important"
site:onedrive.live.com "restricted"
site:pastebin.com "password"
site:github.com "SECRET_KEY"
site:gitlab.com "PRIVATE_KEY"
site:bitbucket.org "db_password"

🔹GitHub Recon🔹

You might also like