We will let you understand dependencies with a perfect example. Imagine
that you are trying to install a java application like Android studio. If there
is no java installed in the system you cannot install and use the Android
studio. That is what a dependency stands for.
In
the next section, we will explain the working of the sublist3r. Follow
along to learn about it in detail.
Starting the sublist3r tool
Run the following command to start the subdomain searching tool .
example@ linuxwar : run sublist3r
We will get a lot of options that can be chosen from this tool. We will even
have a help section when entered -h that explains the commands that can be
used.
Here are the functionalities that this tool can perform in detail:
a)
Domain -d
You can enter this parameter to insert the domain you want to find
subdomains for.
b)
Brute force
This parameter can be used to start a brute force attack using a lot of
domain lists that are entered in a text file. This can be particularly used
when you have a lot of domains to test.
c) Ports
Ports are the functionalities that can
be used for easy sub domain
referencing. This parameter can help the user find vulnerable subdomains
using the open ports .
Apart from these basic parameters, you can use output functionality to get
the results into a text file from a shell interface.
We will now give some example commands
that will let you understand
subdomain enumeration in detail:
1) Python sublist3r.py -d
amazon.com
This command will start an execution that will display all the subdomains
that are present after using the
2) You can use this command to brute force the first 100 domains that are
present in the text file.
python sublist3r text.txt
Through
these simple techniques, you can find subdomains. After finding
the subdomains list you can use techniques like a recon to further dig a lot
of information about them.
While trying
to hack a web application, hackers should prefer this
methodology to easily catch the easy way to get onto the application. That's
it we have completed a brief explanation
about the available web
application tools and in the next section, we will start a detailed explanation
about network tools. Let's go!