1N3 / Sn1per

Attack Surface Management Platform
https://sn1persecurity.com
Other
7.84k stars 1.81k forks source link

subdomain blasting does not work #166

Closed slowmistio closed 5 years ago

slowmistio commented 6 years ago

image

I found that upgrading to 5.2, subdomain blasting does not work.

please check.

slowmistio commented 6 years ago

image

1N3 commented 6 years ago

Hi, what command did you run to perform subdomain brute forcing? The syntax to perform subdomain brute forcing is 'sniper -t target.com --recon -w target'. The --recon or -re flag performs brute forcing and subdomain enumeration. Also, the screenshot you posted which states "SKIPPING FULL NMAP PORT SCAN" are normal debug messages. These are optional scan parameters that must be enabled. To enable full NMap port scans for a scan, use 'sniper -t target.com -fp -w target' and to brute force all services, use the -b flag (ie. sniper -t target.com -w target -b). These options can also be combined, so 'sniper -t target.com -b -fp -o -re -w target) will perform a normal sniper scan + scan all ports, + perform OSINT/recon + brute force all services + enumerate all subdomains. Hope that helps 👍

slowmistio commented 6 years ago

@1N3 oh.. thank you~

slowmistio commented 6 years ago

i used sniper -t baidu.com -b it does not work also.. image

1N3 commented 6 years ago

@1522402210 try 'sniper -t target.com -b -fp -re -o -w target'. That will enable all modules.

1N3 commented 5 years ago

Closing this out for now. Let me know if you still need help with this.