Home Security Tools Sublist3r – Fast Subdomains Enumeration Tool for Penetration Testers

Sublist3r – Fast Subdomains Enumeration Tool for Penetration Testers

by ethhack

Alternatively, each module can be installed independently as shown below.

c:python27python.exe -m pip install requests

  • Install for Ubuntu/Debian:
sudo apt-get install python-requests

  • Install for Centos/Redhat:
sudo yum install python-requests

  • Install using pip on Linux:
sudo pip install requests

dnspython Module

c:python27python.exe -m pip install dnspython

  • Install for Ubuntu/Debian:
sudo apt-get install python-dnspython
sudo pip install dnspython

argparse Module

  • Install for Ubuntu/Debian:
sudo apt-get install python-argparse

  • Install for Centos/Redhat:
sudo yum install python-argparse
sudo pip install argparse

For coloring in windows install the following libraries:

c:python27python.exe -m pip install win_unicode_console colorama

Usage:

-d --domain Domain name to enumerate subdomains of
-b --bruteforce Enable the subbrute bruteforce module
-p --ports         Scan the found subdomains against specific tcp ports
-v --verbose Enable the verbose mode and display results in realtime
-t --threads Number of threads to use for subbrute bruteforce
-e --engines Specify a comma-separated list of search engines
-o --output Save the results to text file
-h --help         show the help message and exit

Examples:

  • To list all the basic options and switches use -h switch:
python sublist3r.py -h

  • To enumerate subdomains of specific domain:
python sublist3r.py -d example.com

  • To enumerate subdomains of specific domain and show only subdomains which have open ports 80 and 443 :
python sublist3r.py -d example.com -p 80,443

  • To enumerate subdomains of specific domain and show the results in realtime:
python sublist3r.py -v -d example.com

  • To enumerate subdomains and enable the bruteforce module:
python sublist3r.py -b -d example.com

  • To enumerate subdomains and use specific engines such Google, Yahoo and Virustotal engines
python sublist3r.py -e google,yahoo,virustotal -d example.com

Using Sublist3r as a module in your python scripts

Example:

import sublist3r 
subdomains = sublist3r.main(domain, no_threads, savefile, ports, silent, verbose, 
enable_bruteforce, engines)

The main function will return a set of unique subdomains found by Sublist3r

Function Usage:

  • domain: The domain you want to enumerate subdomains of.
  • savefile: save the output into text file.
  • ports: specify a comma-sperated list of the tcp ports to scan.
  • silent: set sublist3r to work in silent mode during the execution (helpful when you don’t need a lot of noise).
  • verbose: display the found subdomains in real time.
  • enable_bruteforce: enable the bruteforce module.
  • engines: (Optional) to choose specific engines.

Example to enumerate subdomains of Yahoo.com:

import sublist3r 
subdomains = sublist3r.main('yahoo.com', 40, 'yahoo_subdomains.txt', ports= None, 
silent=False, verbose= False, enable_bruteforce= False, engines=None)



Source link

Related Articles

Leave a Comment

techhipbettruvabetnorabahisbahis forumutaraftarium24eduedusedueduedueduseduedusedusedu
plinko romania
kingbetting güncel giriş
rexbet giriş
grandpashabet güncel giriş
betmatik
cashwin giris
neyine giriş
rokubet casino
sugar rush 1000
padişahbet güncel giriş
imajbet giriş
padişahbet
biabet giriş
pin up aviator
betwild giris
biabet giris