Browsing tag

Subdomain

Find Subdomains of Any Domain With This New Tool

Are you still using command-line subdomain search? There are many methods of finding information about subdomains, but most of them can be time-consuming and disorganized, especially for newcomers to the field of programming. The trend of the moment is using online tools to find information about subdomains. The tool we will be discussing here is […]

Sub.Sh – Online Subdomain Detect Script

  Online Subdomain Detect Script. USAGE  Script bash sub.sh webscantest.com ./sub.sh webscantest.com Curl curl -s -L https://raw.githubusercontent.com/cihanmehmet/sub.sh/master/sub.sh | bash -s webscantest.com   Subdomain Alive Check bash sub_alive.sh bing.com curl -s -L https://raw.githubusercontent.com/cihanmehmet/sub.sh/master/sub_alive.sh | bash -s bing.com” ‼️fping required Nmap -sn (No port scan) scan live IP detection script fping -f ip.txt Usage bash nmap_sn.sh ip.txt […]

TakeOver v1 – Extracts CNAME Record Of All Subdomains At Once

What is Subdomain Takeover? Subdomain takeover is a class of vulnerability where subdomain points to an external service that has been deleted. The external services are Github, Heroku, Gitlab, Tumblr and so on. Let’s assume we have a subdomain sub.example.com that points to an external service such as GitHub. If the Github page is removed […]

How to make a Subdomain Takeover Attack

A team of information security experts tells us that sub-domain acquisition vulnerabilities happen whenever a subdomain points to a service (for example, GitHub pages, Heroku, etc.) that has been removed or removed. This may allow an attacker to configure a page in the service that was being used and direct his page to that subdomain. […]

Different ways of Subdomain enumeration

An information security professional wrote a list of the most popular methods, the expert tried to make a list of some tools and online resources to exploit them. Of course this list is far from exhaustive, there is much new stuff every day, but it’s still a good start. Methods Brute force This is the easiest way. […]