Skip to main content

Installation and use of subfinder

What is subfinder?

Subfinder is a subdomain discovery tool that is part of the Kali Linux toolkit. It is designed to find valid subdomains for websites by using passive online sources and APIs. This tool is widely used in the reconnaissance phase of penetration testing, as it helps in identifying potential entry points in a target domain by discovering its subdomains.

Uses of Subfinder in Kali Linux:

  • Subdomain Enumeration: Subfinder scans various data sources to gather a comprehensive list of subdomains associated with a target domain. This is crucial for understanding the attack surface of a domain.

  • Passive Scanning: Unlike active scanning tools, Subfinder primarily relies on passive sources, meaning it gathers information without directly interacting with the target domain. This reduces the risk of detection by the target.

  • Integration with Other Tools: Subfinder can be used in combination with other tools like Amass or Assetfinder to enhance subdomain discovery efforts. It can also output results in formats compatible with other tools for further analysis.

  • API Integration: The tool supports various APIs (e.g., VirusTotal, Shodan, and Censys) to improve its discovery capabilities. By configuring API keys, users can leverage these services for more extensive subdomain enumeration.

  • Automation in Reconnaissance Workflows: 

    Subfinder can be easily integrated into automated reconnaissance workflows. It can be scripted to run periodically or as part of a CI/CD pipeline to keep track of subdomain changes over time.

first we need go lang  for the installation if you don't have go lang then read  blog :Installation and use of go

Steps for install subfinder:

  • type go install -v github.com/projectdiscovery/subfinder/v2/cmd/subfinder@latest in terminal for install subfinder.
  • then type cd go/bin/
  • then type sudo mv subfinder /usr/local/bin/ 
  • then type subfinder -h for help menu of subfinder.
  • then type subfinder -d geeksforgeeks.org

Comments

Popular posts from this blog

OWASP Top 10 : Understanding Broken Access Control

What is broken access control? Broken access control is a security issue where users can access data or perform actions that they shouldn't be allowed to. This happens when the system fails to properly enforce rules about what users can and cannot do. Types of access controls :  1 . Vertical privilege escalation:  Vertical privilege escalation happens when a normal user gains access to functionalities reserved for higher-privileged users. Example:  A normal user can change the policies of the company.  2. Horizontal privilege escalation:  Horizontal privilege escalation allows a user to switch their access to another user's account, essentially impersonating them. Example:  A normal user can switch their account to admin.  3 . Insecure direct object reference ( IDOR):  IDOR occurs when an application exposes a reference to an internal implementation object, such as a file, directory, or database key. Example:  Suppose...

Installation and use of assetfinder

What is assetfinder ? Assetfinder is a subdomain discovery tool used in Kali Linux, focusing on finding related domains and subdomains for a target. It’s especially valued for its simplicity and efficiency in discovering assets associated with a domain, including subdomains and related domains. Assetfinder is particularly useful during the reconnaissance phase of penetration testing. Uses of Assetfinder in Kali Linux: Subdomain and Domain Discovery:  Assetfinder searches the web to find subdomains and related domains for a target domain. It aggregates data from various sources to provide a comprehensive list of assets. Combining Multiple Data Sources:  The tool integrates with numerous online services and databases, combining their results to give a broader view of the domain’s subdomains. This includes sources like crt.sh , certspotter , hackertarget , and others. Efficient and Quick Enumeration:  Assetfinder is known for its speed and efficiency. It quickly en...

OWASP Top 10 :Understanding Insecure Design

    What is insecure design? Insecure design means creating a system or application without thinking enough about security. These occur when security is not considered or prioritized during the design process, resulting in weaknesses that attackers can exploit. Types of Insecure Design: 1. Lack of Security Requirements:  Not including security requirements during the design phase. Example : Failing to specify that passwords should be stored using strong hashing algorithms. 2. Improper Data Validation:  Not verifying input data properly, Example : Not checking user inputs, allowing SQL injection attacks. 3. Weak Authentication and Authorization:  Inadequate mechanisms to verify user identity and access permissions. Example : Allowing access to sensitive data without proper user verification. 4. Lack of Logging and Monitoring : Not tracking system activities or security events. Example : Not logging failed login attempts, making it hard to detect brute-force attac...