danielmiessler / SecLists

SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project
MIT License
56.9k stars 23.73k forks source link

Discovery/DNS content details #482

Closed hss14 closed 4 years ago

hss14 commented 4 years ago

First I want to apologize that this is a stupid question. But I googled and could not find the answer.

I get the idea that these are possible subdomain names. One possible use case is subdomain enumeration. But what exactly does each file contain? Could someone please explain, or better, add a more detailed README file?

Thank you in advance!

FYI: Contents of Discovery/DNS/

  • subdomains-top1million-5000/20000/110000.txt
  • deepmagic.com-prefixes-top500/50000.txt
  • namelist.txt
  • fierce-hostlist.txt
  • shubs-stackoverflow.txt
  • bitquark-subdomains-top100000.txt
  • sortedcombined-knock-dnsrecon-fierce-reconng.txt
  • shubs-subdomains.txt
  • dns-Jhaddix.txt
g0tmi1k commented 4 years ago

So the files in https://github.com/danielmiessler/SecLists/tree/master/Discovery/DNS, are pre-written suggestions of possible subdomains (either commonly seen/guessed/from zone transfers/made up)

The idea being, you need to take the list, and throw it into a tool and that tool will check to see if that subdomain is valid.

What tool? Depends on what exactly you want - there are a LOT out there, and support/dev quickly changes with them all. gobuster is a good start. But theres 100's if not 1,000 out there.