# Subdomain / Virtual Host

# OSINT - SSL/TLS Certificates

When an SSL/TLS (Secure Sockets Layer/Transport Layer Security) certificate is created for a domain by a CA (Certificate Authority), CA's take part in what's called "Certificate Transparency (CT) logs". These are publicly accessible logs of every SSL/TLS certificate created for a domain name. The purpose of Certificate Transparency logs is to stop malicious and accidentally made certificates from being used.

We can use this service to our advantage to discover subdomains belonging to a domain, sites like https://crt.sh and https://transparencyreport.google.com/https/certificates offer a searchable database of certificates that shows current and historical results.

# OSINT - Search Engines

# Google

Search for subdomains and exclude www.

-site:www.mydomain.com site:*.mydomain.com

# OSINT - Tools

# Sublist3r

./sublist3r.py -d mydomain.com

# TheHarvester

theHarverster -d google.com -b google,twitter,linkedin,bing,yahoo,sublist3r

# DNS Bruteforce

# Dnsrecon

dnsrecon -t brt -d mydomain.com
# /usr/share/wordlists/SecLists/Discovery/DNS/namelist.txt

# Knockpy

knockpy google.com -w /usr/share/seclists/Discovery/DNS/shubs-stackoverflow.txt

# Virtual Hosts

# GOBUSTER
gobuster vhost -w /usr/share/seclists/Discovery/DNS/subdomains-top1million-5000.txt -u http://shibboleth.htb

# FFUF
ffuf -w /usr/share/wordlists/SecLists/Discovery/DNS/namelist.txt -H "Host: FUZZ.mydomain.com" -u http://MACHINE_IP -fs {SIZE}