Sublist3r – Tool for Penetration testers to Enumerate Sub-domains

0
Sublist3r

Sublist3r a python based enumeration tool that enumerates subdomains of the domain using Google, Yahoo, Bing, Baidu, and Ask. It also enumerates subdomains using Netcraft, Virustotal, ThreatCrowd, DNSdumpster, and ReverseDNS.

Subbrute added with it to enhance the finding of all possible domains using brute force with an improved word list.In this Kali Linux tutorial, we show how to enumerate the subdomains with Sublist3r.

Working with Sublist3r

To clone the tool

https://github.com/aboul3la/Sublist3r.git

Recommended Versions

Python 2 is 2.7.x
Python 3 is 3.4.x

Also Read Email Spoofing – Exploiting Open Relay configured Public Mailservers

To list all the possible options

python sublist3r.py -h

Sublist3r

To enumerate subdomains of specific domain

 python sublist3r.py -d google.com

Sublist3r

To enumerate subdomains of specific domain and show only subdomains which have open ports 80 and 443

 python sublist3r.py -v -d vulnweb.com -p 80,443

Sublist3r
Sublist3r

The pen-testing helps administrator to close unused ports, additional services, Hide or Customize banners, Troubleshooting services and to calibrate firewall rules.You should test in all ways to guarantee there is no security loophole.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Disclaimer

This article is only for an Educational purpose. Any actions and or activities related to the material contained on this Website is solely your responsibility.The misuse of the information on this website can result in criminal charges brought against the persons in question. The authors and www.gbhackers.com  will not be held responsible in the event any criminal charges be brought against any individuals misusing the information in this website to break the law.