DNS Hunting
massdns : DNS brute-force. It's very fast however it's prone to false positives.
sed 's/$/.domain.com/' subdomains.txt > bf-subdomains.txt
./massdns -r resolvers.txt -w /tmp/results.txt bf-subdomains.txt
grep -E "tesla.com. [0-9]+ IN A .+" /tmp/results.txtgobuster : 1 resolver/layer
gobuster dns -d mysite.com -t 50 -w subdomains.txtshuffledns : wrapper around massdns
massdnsshuffledns -d example.com -list example-subdomains.txt -r resolvers.txtpuredns : It also uses massdns.
massdns.puredns bruteforce all.txt domain.comaiodnsbrute : uses asyncio to brute force domain names asynchronously.
aiodnsbrute -r resolvers -w wordlist.txt -vv -t 1024 domain.comSecond Round DNS Brute-Force
dnsgen : Given the domains and subdomains generate permutations.
cat subdomains.txt | dnsgen -VHOST
CORS Brute Force
Sometimes you will find pages that only return the header Access-Control-Allow-Origin when a valid domain/subdomain is set in the Origin header. In these scenarios, you can abuse this behaviour to discover new subdomains.
Wordlists
https://gist.github.com/jhaddix/86a06c5dc309d08580a018c66354a056
Last updated
Was this helpful?