0x0FB0 / pulsar

Network footprint scanner platform. Discover domains and run your custom checks periodically.
https://0x0fb0.github.io/pulsar/
Apache License 2.0
403 stars 85 forks source link

Sub Domain Enumeration #24

Closed mrdavi5 closed 4 years ago

mrdavi5 commented 4 years ago

Hey! What methods does this tool use for Sub Domain enumeration?

0x0FB0 commented 4 years ago

All OWASP Amass community data sources (no commercial APIs by default)

As per OWASP Amass documentation:

Information Gathering Techniques Used:

DNS: Basic enumeration, Brute forcing (optional), Reverse DNS sweeping, Subdomain name alterations/permutations, Zone transfers (optional) Scraping: Ask, Baidu, Bing, DNSDumpster, DNSTable, Dogpile, Exalead, Google, HackerOne, IPv4Info, Netcraft, PTRArchive, Riddler, SiteDossier, ViewDNS, Yahoo Certificates: Active pulls (optional), Censys, CertSpotter, Crtsh, Entrust, GoogleCT APIs: AlienVault, BinaryEdge, BufferOver, CIRCL, CommonCrawl, DNSDB, GitHub, HackerTarget, IPToASN, Mnemonic, NetworksDB, PassiveTotal, Pastebin, RADb, Robtex, SecurityTrails, ShadowServer, Shodan, Spyse (CertDB & FindSubdomains), Sublist3rAPI, TeamCymru, ThreatCrowd, Twitter, Umbrella, URLScan, VirusTotal, WhoisXML Web Archives: ArchiveIt, ArchiveToday, Arquivo, LoCArchive, OpenUKArchive, UKGovArchive, Wayback

You can also look into amass.ini config file for more details.

Pulsar custom sources:

mrdavi5 commented 4 years ago

Awesome sound great!