Day 35 – Subdomain Enumeration | Complete Beginner Guide
🌐 Day 35: Subdomain Enumeration
Bug hunting me ek bahut powerful concept hai:
Subdomain Enumeration
Kai baar main website secure hoti hai, lekin uske subdomains vulnerable hote hain 🔥
Isliye professional bug hunters hamesha subdomains find karte hain.
🧠 Subdomain Kya Hota Hai?
Example domain:
example.com
Iske subdomains ho sakte hain:
admin.example.com
api.example.com
dev.example.com
mail.example.com
Ye sab main domain ke parts hain, lekin alag services run kar sakte hain.
🎯 Subdomain Enumeration Kya Hota Hai?
Subdomain Enumeration ka matlab hai:
✔ Kisi domain ke sabhi subdomains ko identify karna
✔ Hidden ya forgotten subdomains discover karna
✔ Attack surface expand karna
Simple words me:
Jitne zyada entry points milenge, utni zyada vulnerability milne ke chances.
🔍 Subdomains Important Kyu Hote Hain?
Developers kabhi-kabhi:
Test server expose chhod dete hain
Old subdomain delete nahi karte
Dev environment public reh jata hai
Example large companies jaise:
Google
Facebook
Inke hundreds subdomains hote hain.
Har subdomain ek potential target hota hai.
🌓 Subdomain Enumeration Ke Types
1️⃣ Passive Enumeration
Isme aap target ko directly scan nahi karte.
Sources:
✔ Search engines
✔ Certificate transparency logs
✔ Public DNS records
✔ Security databases
Ye safe aur legal approach hai (within scope).
2️⃣ Active Enumeration
Isme aap directly target system ko query karte ho.
Example:
✔ DNS brute force
✔ Subdomain scanning tools
Permission hona zaruri hai.
🛠 Common Methods (Conceptual)
1️⃣ Search Engine Method
Example:
site:example.com -www
Hidden subdomains mil sakte hain.
2️⃣ Certificate Transparency Logs
Jab SSL certificate issue hota hai, subdomain ka record public ho sakta hai.
3️⃣ DNS Records Check
DNS query karke subdomain discover kiya ja sakta hai.
4️⃣ Brute Force Wordlist
Common names try kiye jate hain:
admin
test
dev
staging
api
🔥 Real-World Scenario
Maan lo:
Main website secure hai.
Lekin:
dev.example.com
Publicly accessible hai aur debug mode on hai.
Yaha:
✔ Sensitive data mil sakta hai
✔ Admin panel exposed ho sakta hai
✔ Old vulnerabilities mil sakti hain
Isi liye subdomain enumeration important hai.
🧩 Enumeration Ke Baad Kya Kare?
Jab subdomains mil jayein:
Live hosts identify karo
HTTP/HTTPS check karo
Technologies identify karo
Login panels search karo
API endpoints observe karo
Phir vulnerability testing start hoti hai.
⚠ Important Note
✔ Hamesha program scope check karein
✔ Unauthorized scanning illegal ho sakta hai
✔ Responsible testing karein
Ethical hacking ka matlab legal boundaries follow karna hai.
🧠 Beginner Mistakes
❌ Sirf main domain test karna
❌ Dev/staging subdomains ignore karna
❌ Documentation maintain na karna
Professional bug hunter har subdomain list maintain karta hai.
🔁 Revision Points
Subdomain = Domain ka extended part
Enumeration = Subdomains discover karna
Passive aur Active methods hote hain
Dev/test servers common weak points hote hain
Scope follow karna mandatory hai