sublist3r is a tool designed for discovering subdomains of websites. It uses search engines like Google, Yahoo, Bing, and others to enumerate subdomains, making it a powerful tool for reconnaissance in penetration testing and vulnerability assessment.
Common sublist3r Options:
- Domain Name: The main domain for which you want to find subdomains.
- Search Engines: You can specify which search engines to use for the search, such as Google, Yahoo, Bing, or Baidu. Leaving this blank will use the default set of engines.
- –bruteforce: Uses a bruteforce technique to find subdomains in addition to search engine queries.
- –verbose: Enables verbose mode to display more detailed output during the process.
Examples of Sublist3r Commands:
- Discover subdomains for example.com using default search engines:
> sublist3r -d example.com
- Use Google and Bing to find subdomains for example.com:
> sublist3r -d example.com -e google,bing
- Perform a bruteforce attack to find subdomains for example.com:
> sublist3r -d example.com --bruteforce
- Use verbose mode for detailed output while enumerating subdomains:
> sublist3r -d example.com --verbose