TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Ask HN: How to enumerate all subdomains of a main domain like foo.com?

41 点作者 dedalus将近 7 年前

14 条评论

danielrm26将近 7 年前
These will find your droids.<p>sublist3r <a href="https:&#x2F;&#x2F;github.com&#x2F;aboul3la&#x2F;Sublist3r" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;aboul3la&#x2F;Sublist3r</a><p>amass <a href="https:&#x2F;&#x2F;github.com&#x2F;caffix&#x2F;amass" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;caffix&#x2F;amass</a><p>subfinder <a href="https:&#x2F;&#x2F;github.com&#x2F;subfinder&#x2F;subfinder" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;subfinder&#x2F;subfinder</a>
评论 #17456990 未加载
haloux将近 7 年前
Ah, the classical network pentester&#x27;s problem. There&#x27;s really no one good way to go about this.<p>Certificate transparency tools like CTFR (<a href="https:&#x2F;&#x2F;github.com&#x2F;UnaPibaGeek&#x2F;ctfr" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;UnaPibaGeek&#x2F;ctfr</a>) work only if certs are registered.<p>You could go old school and use a tool like Sublist3r (<a href="https:&#x2F;&#x2F;github.com&#x2F;aboul3la&#x2F;Sublist3r" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;aboul3la&#x2F;Sublist3r</a>) or Punter (<a href="https:&#x2F;&#x2F;github.com&#x2F;nethunteros&#x2F;punter" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;nethunteros&#x2F;punter</a>), but ymmv as API endpoints are savvy to these tools and actively work to snub them out.<p>AXFR queries can be useful if the DNS server allows for it (my experience: 0-15).<p>Best of luck.
lunixbochs将近 7 年前
If the domain uses DNSSEC, you can do an offline brute force:<p><a href="https:&#x2F;&#x2F;security.stackexchange.com&#x2F;questions&#x2F;94503&#x2F;does-dnssec-still-have-the-enumerate-all-names-in-zone-problem" rel="nofollow">https:&#x2F;&#x2F;security.stackexchange.com&#x2F;questions&#x2F;94503&#x2F;does-dnss...</a><p><a href="https:&#x2F;&#x2F;nmap.org&#x2F;nsedoc&#x2F;scripts&#x2F;dns-nsec3-enum.html" rel="nofollow">https:&#x2F;&#x2F;nmap.org&#x2F;nsedoc&#x2F;scripts&#x2F;dns-nsec3-enum.html</a><p>There are tools for online brute force, but that&#x27;s not very polite :)
fulafel将近 7 年前
Ask the name server: do a AXFR query, as in host -l foo.com.<p>These days many domains are configured to refuse AXFR queries though. Then there&#x27;s a misguided but common phenomenon called split-horizon DNS is also common, where you serve different records as answers to the same query based on what the query originator&#x27;s address is.
评论 #17453734 未加载
评论 #17454868 未加载
评论 #17452197 未加载
k4ch0w将近 7 年前
Check Google, Bing, Virustotal, Parse HTTPS Certificates including the metadata (Censys.io is great for specific queries), subdomain bruteforce with a good wordlist, download source code found in Github and regex search for HTTP urls, then parse them.<p>Now don&#x27;t do it by hand people have already built tools. I recommend sublist3r <a href="https:&#x2F;&#x2F;github.com&#x2F;aboul3la&#x2F;Sublist3r" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;aboul3la&#x2F;Sublist3r</a>, however, grab other subdomain bruteforcer wordlists and append them all together.<p>Go to <a href="https:&#x2F;&#x2F;opendata.rapid7.com&#x2F;" rel="nofollow">https:&#x2F;&#x2F;opendata.rapid7.com&#x2F;</a>, download the reverse DNS and Forward DNS and grep for your domain. I.E grep &quot;*.mydomain.com&quot; These are amazing.<p>I will make a note, sometimes if you are looking for servers related to a company specifically people miss ones that aren&#x27;t in a company&#x27;s zone file. You need to use a service like Shodan or Censys which regularly scan the internet and index these. It can be a pain to parse through these results but if you are strapped for ideas on getting a foodhold try this. I have found some juicy servers with this in mind.<p>If you are on a pentest it is completely ok to ask your client for permission to view their zone file&#x2F;route53 as well. This will save you a lot of time up front.
snowwrestler将近 7 年前
This guy:<p><a href="https:&#x2F;&#x2F;medium.com&#x2F;@jonathanbouman&#x2F;how-i-hacked-apple-com-unrestricted-file-upload-bcda047e27e3" rel="nofollow">https:&#x2F;&#x2F;medium.com&#x2F;@jonathanbouman&#x2F;how-i-hacked-apple-com-un...</a><p>Used a tool called Aquatone:<p><a href="https:&#x2F;&#x2F;github.com&#x2F;michenriksen&#x2F;aquatone&#x2F;" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;michenriksen&#x2F;aquatone&#x2F;</a><p>I have not used Aquatone; I just remembered this from a post on HN pretty recently.
dividuum将近 7 年前
You might search for subdomains using CT if they have certificates registered for them explicitly: <a href="https:&#x2F;&#x2F;transparencyreport.google.com&#x2F;https&#x2F;certificates" rel="nofollow">https:&#x2F;&#x2F;transparencyreport.google.com&#x2F;https&#x2F;certificates</a>
评论 #17453704 未加载
pixdamix将近 7 年前
I suggest you to take a look at this: <a href="http:&#x2F;&#x2F;10degres.net&#x2F;subdomain-enumeration&#x2F;" rel="nofollow">http:&#x2F;&#x2F;10degres.net&#x2F;subdomain-enumeration&#x2F;</a> :-)
urtrs将近 7 年前
this tool could help you <a href="https:&#x2F;&#x2F;github.com&#x2F;caffix&#x2F;amass" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;caffix&#x2F;amass</a>
chrono_sphere将近 7 年前
Try fierce pl - there may be newer ways but this has always yielded decent results for me when pentesting. You generally have to do some form of brute force as most DNS servers won&#x27;t spill their guts these days.
jack9将近 7 年前
Adding a responsive subdomain to any domain you control is trivial and isn&#x27;t registered anywhere (necessarily). I&#x27;m not sure you can achieve this, without additional requirements.
efficax将近 7 年前
It&#x27;s perfectly possible to have a wildcard and respond to every subdomain.<p>But otherwise just use nslookup&#x2F;dig&#x2F;host
danielrm26将近 7 年前
You should use a combination of three tools:<p>- sublist3r - amass - subfinder<p>They&#x27;re all on Github.
wank将近 7 年前
login to cloudflare, add domain, wait for DNS slurp, export full record, delete domain.