Closed slowmistio closed 5 years ago
Hi, what command did you run to perform subdomain brute forcing? The syntax to perform subdomain brute forcing is 'sniper -t target.com --recon -w target'. The --recon or -re flag performs brute forcing and subdomain enumeration. Also, the screenshot you posted which states "SKIPPING FULL NMAP PORT SCAN" are normal debug messages. These are optional scan parameters that must be enabled. To enable full NMap port scans for a scan, use 'sniper -t target.com -fp -w target' and to brute force all services, use the -b flag (ie. sniper -t target.com -w target -b). These options can also be combined, so 'sniper -t target.com -b -fp -o -re -w target) will perform a normal sniper scan + scan all ports, + perform OSINT/recon + brute force all services + enumerate all subdomains. Hope that helps 👍
@1N3 oh.. thank you~
i used sniper -t baidu.com -b it does not work also..
@1522402210 try 'sniper -t target.com -b -fp -re -o -w target'. That will enable all modules.
Closing this out for now. Let me know if you still need help with this.
I found that upgrading to 5.2, subdomain blasting does not work.
please check.