Online
Sublist3r
Overview
What
Sublist3r is a Python-based tool designed to enumerate subdomains of websites using OSINT (Open Source Intelligence). It is particularly useful for penetration testers and bug hunters to collect and gather subdomains for the domains they are targeting. Sublist3r leverages multiple search engines and online services to find subdomains, including Google, Yahoo, Bing, Baidu, Ask, Netcraft, VirusTotal, ThreatCrowd, DNSdumpster, and ReverseDNS. Additionally, Sublist3r integrates with Subbrute to enhance subdomain discovery through brute-force techniques using an improved wordlist.
Key Features
- Enumerates subdomains using multiple search engines.
- Utilizes online services for comprehensive subdomain discovery.
- Integrates brute-force techniques for increased subdomain detection.
- Easy to install and use.
Installation
git clone https://github.com/aboul3la/Sublist3r.git
cd Sublist3r
pip install -r requirements.txt
python3 sublist3r.py -hUsage Examples
Basic Subdomain Enumeration
To enumerate subdomains for a specific domain:
python3 sublist3r.py -d example.comUsing a Specific Search Engine
To use a specific search engine, such as Google, for subdomain enumeration:
python3 sublist3r.py -d example.com -e googleBrute-Force Subdomain Enumeration
To perform brute-force subdomain enumeration using Subbrute:
python3 sublist3r.py -d example.com -bOther DNS Recon Tools
DNSRecon
DNSRecon is another tool for brute-forcing subdomains:
dnsrecon -d example.com -t brt -D /usr/share/wordlists/dnsmap.txtDNSEnum
DNSEnum is used for comprehensive DNS enumeration:
dnsenum example.comFierce
Fierce is a DNS reconnaissance tool with a brute-force option:
fierce -dns example.com -wordlist dictionary.txtWfuzz Overview
Wfuzz is a versatile tool used for brute-forcing web applications, including subdomain discovery. It allows customization of headers, such as the Host header, and filtering of HTTP response codes to identify valid subdomains.
Basic Usage Examples
Subdomain Brute-Forcing
To brute-force subdomains using a wordlist:
wfuzz -w /usr/share/SecLists/Discovery/DNS/subdomains-top1million-110000.txt -H "Host: FUZZ.example.com" --hc 403,400 -t 80 example.comBrute-Forcing with Custom Headers
To brute-force with a custom Host header:
wfuzz -c -w wordlist.txt -u http://example.com -H "Host: FUZZ.shoppy.htb" --hc 301Additional Tips
Modify /etc/hosts
To ensure subdomain resolution, you can add entries to the /etc/hosts file:
echo "10.10.11.180 mattermost.shoppy.htb" | sudo tee -a /etc/hosts