Day3 Recon: Subdomain Enumeration for Beginners: A Hands-On Guide Using Sublist3r, Amass & Gobuster
文章介绍如何通过子域名枚举发现网站隐藏部分,如登录页面和管理面板,并使用Sublist3r、Amass和Gobuster等工具进行操作。 2025-8-6 14:37:12 Author: infosecwriteups.com(查看原文) 阅读量:4 收藏

Ayush Kumar

Discover how hackers and security pros uncover hidden subdomains — and how you can too, using free tools and a few commands.

Zoom image will be displayed

Ever wondered how security researchers (and hackers) manage to dig up all the hidden corners of a website — the secret login pages, admin panels, or forgotten services? It often starts with subdomain enumeration.

Not Medium Member: Read Here

And guess what? You don’t need to be a cybersecurity expert to start doing it yourself. In this post, I’ll walk you through how to discover subdomains using three popular tools: Sublist3r, Amass, and Gobuster.

Let’s get our hands dirty.

Subdomains are like branches of a website. For example:

  • blog.example.com
  • admin.example.com
  • dev.example.com

Sometimes, these subdomains lead to outdated or vulnerable services. Finding them is a common step in bug bounty hunting and penetration testing.

That’s where subdomain enumeration comes in — it’s the process of discovering all those lesser-known branches.


文章来源: https://infosecwriteups.com/day3-recon-subdomain-enumeration-for-beginners-a-hands-on-guide-using-sublist3r-amass-gobuster-20ce5cacab81?source=rss----7b722bfd1b8d--bug_bounty
如有侵权请联系:admin#unsafe.sh