Site icon TechGiant

How to find Subdomains of a Domain in Minutes?

The discovery of a domain’s subdomains is a vital element of hacker reconnaissance, and the following web tools mentioned in this article make the process easier.

Having an unprotected subdomain poses a significant risk to your business, and there have been recent security incidents in which hackers exploited subdomain vulnerabilities. The most recent was Vine, when the whole source code was accessible for download from a subdomain that was vulnerable.

13 Tools to Find Subdomains of a Domain in Minutes

If you are the owner of a website or a security researcher, you can use the following tools to locate the subdomains of any domain.

1. Subdomains Lookup Tools

WhoisXML API’s Subdomains Lookup tools enable users to easily discover a domain’s subdomains. The subdomains product line is supported by a database containing over 2.3 billion subdomain records, with over 1 million subdomains being added everyday.

The tools enable research on any target domain name and display a list of all subdomains discovered for the domain, together with timestamps indicating the first time a record was observed and the most recent update to a given record.

The product range consists of:

 

2. DNS Dumpster

DNSDumpster is a tool for locating host-related domain information. This is the HackerTarget.com endeavor. It provides information about DNS server, MX record, TXT record, and domain mapping in addition to subdomain information.

3. NMMAPPER

A web-based tool for find subdomains utilizing Anubis, Amass, DNScan, Sublist3r, Lepus, and Censys, among others.

One of the domains was tested with NMMAPPER, and the results were accurate. Try it out as part of your research endeavors.

4. Sublist3r

Sublist3r is a Python application that uses a search engine to locate subdomains. Presently, Google, Yahoo, Bing, Baidu, Ask, Netcraft, Virustotal, ThreatCrowd, DNSdumpster, and PassiveDNS are supported. Sublist3r is only compatible with Python 2.7 and has few library dependencies. This utility is compatible with Windows, CentOS, Rehat, Ubuntu, Debian, and any other UNIX-based operating system. The sample below is from CentOS/Linux.

wget https://github.com/aboul3la/Sublist3r/archive/master.zip .
unzip master.zip

As previously stated, it requires the following dependencies and may be installed using the yum command.

yum install python-requests python-argparse
./sublist3r.py -d yourdomain.com

Evidently, it did identify my subdomains.

5. Netcraft

Netcraft has a huge number of domain databases, which should not be overlooked when searching for public subdomain data. The search result will include all domains and subdomains with first seen, netblock, and operating system details.

If you require additional information about the website, click on-site report and you will be presented with a plethora of data regarding technologies, rankings, etc.

6. CloudPiercer

CloudPiercer is occasionally useful for determining if a subdomain exists in your domain. It is an excellent and simple technique to determine if the origin IP of your website is exposed. Exposing the origin IP can encourage hackers to prepare for DDoS assaults.

7. Detectify

You can use Detectify to scan a domain against hundreds of predefined terms, but you shouldn’t do this with a domain you don’t really own. Nevertheless, if you have authorized a user, you can allow subdomain discovery in the settings section of the overview.

8. SubBrute

SubBrute is one of the most popular and precise subdomain discovery tools. It does not send traffic to the domain’s name servers because it is a community-driven initiative that employs an open resolver as a proxy.

This is not an online tool; it must be downloaded and installed on your computer. Windows and UNIX-based operating systems are supported, and installation is a breeze. The demonstration that follows is based on CentOS/Linux.

wget https://github.com/TheRook/subbrute/archive/master.zip .
unzip master.zip
./subbrute.py yourdomain.com

It will take a few seconds and return any subdomain that is found.

9. Knock

Knock is an additional Python-based subdomain finding tool that has been tested with Python 2.7.6. Using a wordlist, the subdomain of a target domain is determined.

wget https://github.com/guelfoweb/knock/archive/knock3.zip .
unzip knock3.zip

It will extract the file and create a folder named “knock-knock3.”

python setup.py install
./knockpy.py yourdomain.com

10. DNSRecon on Kali Linux

Kali Linux is an excellent operating system for security researchers, and DNSRecon can be used on Kali without installation. It examines all NS records for zone transfers, overall DNS records, wildcard resolution, PTR record, and so forth. Execute the following to use DNSRecon, and you’re done.

11. Pentest-Tools

Multiple techniques, such as DNS zone transfer, DNS enumeration based on a wordlist, and a public search engine, are utilized by Pentest-tools to search for subdomains. The output can be saved in PDF format.

12. MassDNS

MassDNS is the appropriate application for resolving domain names in bulk. This tool can resolve more than 350 thousand domains per second! It employs publicly accessible resolvers and is suitable for users that wish to resolve millions or even billions of domain names. This program may raise the demand on public resolvers, which could result in your IP address being labeled as abusive. Therefore, care must be used when using this instrument.

13. OWASP Amass

Amass was developed to assist information security experts with network mapping of attack surfaces and external asset discovery. The software is completely free to use, and its customers includes the industry-leading IT firm Accenture.

Conclusion

Using the aforementioned tools, you should be able to identify subdomains of the target domain for security investigation. You might also utilize an online port scanner.

Exit mobile version