diff --git a/content/information-gathering/subdomain-enumeration.md b/content/information-gathering/subdomain-enumeration.md index b455086..cb99afb 100644 --- a/content/information-gathering/subdomain-enumeration.md +++ b/content/information-gathering/subdomain-enumeration.md @@ -39,6 +39,27 @@ of the same organization. ## Tools +#### BBOT [^bbot] +```sh +# subdomains +bbot -t tesla.com -f subdomain-enum + +# subdomains (passive only) +bbot -t tesla.com -f subdomain-enum -rf passive + +# subdomains + port scan + web screenshots +bbot -t tesla.com -f subdomain-enum -m naabu gowitness -n my_scan -o . +``` +{{
}} +- `-t`: Target domain(s). +- `-f`: Enable modules with these flags. +- `-rf passive`: Only enable passive modules. +- `-m`: Enable individual modules. +- `-n`: Name your scan (default: random name). +- `-o`: Choose your output directory. +- API keys go in ~/.config/bbot/secrets.yaml. +{{
}} + #### Amass [^amass] ```sh amass enum -passive -d {{< param "war.rdomain" >}} -o results.txt @@ -167,6 +188,18 @@ Useful Wordlists: - Daniel Miessler's [DNS Discovery](https://github.com/danielmiessler/SecLists/tree/master/Discovery/DNS). - [Commonspeak2](https://github.com/assetnote/commonspeak2-wordlists) +#### BBOT [^bbot] +Note: BBOT's massdns module automatically pulls an [up-to-date list of the latest public resolvers](https://github.com/blacklanternsecurity/public-dns-servers). It also brute-forces recursively based on mutations from the subdomains it finds. Run with `-f subdomain-enum` for best results. +```sh +bbot -t tesla.com -m massdns -c modules.massdns.wordlist=./all.txt modules.massdns.max_resolvers=1000 +``` +{{
}} +- `-t`: Target domain(s). +- `-f`: Enables modules with these flags. +- `-c modules.massdns.wordlist`: Massdns custom wordlist (can be either local file or URL) (default: `subdomains-top1million-5000.txt`) +- `-c modules.massdns.max_resolvers`: Massdns resolvers (default: 500) +{{
}} + #### Amass [^amass] ```sh amass enum -brute -w subdomains.txt -d {{< param "war.rdomain" >}} -o results.txt @@ -320,3 +353,4 @@ curl -I -s -L https://www.maxrodrigo.com | grep -iE 'Content-Security|CSP' [^dnsrecon]: darkoperator. “GitHub - Darkoperator/Dnsrecon: DNS Enumeration Script.” GitHub, https://github.com/darkoperator/dnsrecon. [^sublist3r]: aboul3la. “GitHub - Aboul3la/Sublist3r: Fast Subdomains Enumeration Tool for Penetration Testers.” GitHub, https://github.com/aboul3la/Sublist3r. [^amass]: “GitHub - OWASP/Amass: In-Depth Attack Surface Mapping and Asset Discovery.” GitHub, https://github.com/OWASP/Amass. +[^bbot]: “GitHub - blacklanternsecurity/bbot: OSINT automation for hackers.” GitHub, https://github.com/blacklanternsecurity/bbot.