Subdomain Enumeration

Overview

Subdomain enumeration is a critical phase of web reconnaissance that focuses on discovering subdomains and DNS infrastructure. This process reveals the attack surface by identifying additional hosts, services, and potential entry points that might not be immediately visible.

Key Objectives:

  • Discover hidden subdomains and services

  • Map DNS infrastructure and name servers

  • Identify cloud resources and third-party services

  • Analyze DNS security configurations

  • Enumerate zone transfers and DNS vulnerabilities


DNS Tools Overview

Tool
Key Features
Best Use Case

dig

Versatile DNS lookup tool supporting all record types with detailed output

Manual DNS queries, zone transfers, troubleshooting

dnsenum

Comprehensive DNS enumeration with zone transfers, brute-forcing, WHOIS

All-in-one automated DNS reconnaissance

fierce

DNS reconnaissance with recursive search and wildcard detection

User-friendly subdomain discovery

dnsrecon

Multi-technique DNS reconnaissance with custom output formats

Comprehensive enumeration with various methods

amass

Advanced subdomain discovery with 30+ data sources

Maximum subdomain coverage (passive + active)

assetfinder

Simple subdomain discovery using various techniques

Quick lightweight scans

subfinder

Passive subdomain enumeration from public sources

Stealth reconnaissance

puredns

High-performance DNS brute-forcer with wildcard filtering

Massive wordlist handling

theHarvester

OSINT tool gathering subdomains from search engines

Email addresses + subdomain discovery


Manual DNS Enumeration

The Domain Information Groper (dig)

The dig command is the most versatile DNS enumeration tool, essential for manual analysis:

Common dig Commands

Zone Transfer Attempts

Advanced dig Techniques


Automated DNS Enumeration

dnsenum - Comprehensive DNS Enumeration

dnsenum is a versatile Perl-based tool providing comprehensive DNS reconnaissance:

Key Features:

  • DNS Record Enumeration (A, AAAA, NS, MX, TXT)

  • Automatic zone transfer attempts

  • Subdomain brute-forcing with wordlists

  • Google scraping for additional subdomains

  • Reverse lookups and WHOIS integration

fierce - User-Friendly Subdomain Scanner

dnsrecon - Advanced DNS Reconnaissance


Advanced Subdomain Discovery

amass - Comprehensive Subdomain Discovery

amass is the most powerful subdomain discovery tool with extensive data sources:

Key Features:

  • 30+ external data sources for passive enumeration

  • Active DNS brute-forcing and permutation

  • Integration with APIs and other tools

  • Network mapping and visualization

  • Continuous monitoring capabilities

Configuration Example:

puredns - High-Performance DNS Brute-Forcer

puredns excels at high-performance brute-forcing with smart filtering:

Key Features:

  • Handles massive wordlists efficiently

  • Wildcard detection and filtering

  • Custom DNS resolver configuration

  • Rate limiting to prevent server overload

  • Trusted domain validation


Passive Subdomain Discovery

Certificate Transparency

subfinder - Passive Subdomain Discovery

assetfinder - Quick Subdomain Enumeration

theHarvester - OSINT DNS Gathering


Tool Selection Guide

When to Use What

Scenario
Recommended Tool
Reason

Quick manual DNS queries

dig

Most versatile, detailed output

Comprehensive automated scan

dnsenum

All-in-one: zone transfers, brute-force, WHOIS

Passive reconnaissance only

amass (passive)

30+ data sources, stealth

Maximum subdomain coverage

amass (active)

Passive + active brute-forcing

High-performance brute-forcing

puredns

Massive wordlists, wildcard filtering

User-friendly quick scan

fierce

Simple interface, wildcard detection

Multi-technique approach

dnsrecon

Various techniques, custom outputs

Quick lightweight scan

assetfinder

Fast, simple discovery

Performance Comparison

Tool
Speed
Accuracy
Stealth
Wordlist Size
Resource Usage

dig

Manual

High

High

Manual

Low

dnsenum

Medium

High

Medium

Medium

Medium

amass

Medium-Fast

Very High

High (passive)

Large

High

puredns

Very Fast

High

Medium

Very Large

Medium

fierce

Fast

High

Medium

Medium

Low

dnsrecon

Medium

High

Medium

Medium

Medium

assetfinder

Fast

Medium

High

N/A

Low

subfinder

Fast

High

High

N/A

Low


Phase 1: Quick Discovery

Phase 2: Passive Enumeration

Phase 3: Active Enumeration

Phase 4: High-Performance Brute-Forcing


HTB Academy Lab Examples

Lab 1: DNS Analysis


Security Considerations

Rate Limiting

Stealth Techniques


Defensive Measures

DNS Server Hardening

Monitoring and Detection


Key Takeaways

  1. dig is essential for manual DNS analysis and troubleshooting

  2. dnsenum provides comprehensive automated enumeration

  3. amass offers maximum subdomain coverage with 30+ sources

  4. puredns excels at high-performance brute-forcing

  5. Passive enumeration (amass passive, subfinder) avoids detection

  6. Rate limiting is crucial to prevent blocking

  7. Zone transfers should be tested on all name servers

  8. Certificate transparency provides valuable subdomain data

  9. Tool combination yields better results than single tools

  10. DNS security can be assessed through enumeration attempts


References

  • HTB Academy: Information Gathering - Web Edition

  • RFC 1034, 1035: Domain Names - Concepts and Facilities

  • OWASP Testing Guide: Information Gathering

  • SecLists: https://github.com/danielmiessler/SecLists

  • Amass Documentation: https://github.com/OWASP/Amass

Last updated