Monstersec Blog
LinkedinTwitter
  • Monstersec Blog
  • Adversary Experience
    • Undetectable Phishing setup
    • How to Root any Android phone In A Just Few Hours
    • Red Team Plot
      • Red Team Simulation
      • AD Enumeration
        • Powerview
      • Initial Access
      • Defense Evasion
      • Local Privilege Escalation
      • Credential Access
      • Lateral Movement
      • Local Persistence
      • Domain Privilege Escalation
      • Domain Persistence
      • Beyond Domain Admin
      • AD Certificate Service Attacks
      • Red Team Reference
    • Detection - Blue Team
    • Ransomware Plot
      • Ransomware TTPs
      • Ransomware Analysis
    • Pentesting Plot
      • Mobile Pentesting
      • Network Pentesting
      • API Pentesting
      • Web Pentesting
    • OSINT Plot
    • Cloud Security Plot
      • Azure
      • AWS
      • GCP
    • Attack Surface Management Plot
      • Asset Inventory
      • Asset Analysis
      • Vulnerability Finding
      • Risk Prioritization
    • DDoS Simulation
      • Layer 3
      • Layer 4
      • Layer 7
      • DDOS Bot
    • Automation
    • Cyber Security - Interview Questions
      • Basic Computer Science
      • Offensive Security
        • Pentesting
          • Network
          • Mobile
          • web
        • Red Teaming
        • Cloud Security
Powered by GitBook
On this page

Was this helpful?

  1. Adversary Experience
  2. Attack Surface Management Plot

Asset Inventory

Subdomain Enumeration:

LogoPassive Subdomain Enumeration (Part 1) - CheckmateCheckmate
LogoActive Subdomain Enumeration (Part 2) - CheckmateCheckmate

Note:

  • All the passive techniques will be covered by subdomain enumeration tools ex: subfinder, Amass etc.

  • In order to cover the active enumeration, we need a good word lists and resolver list for finding the subdomains. Ex: massdns, puredns.

PreviousAttack Surface Management PlotNextAsset Analysis

Last updated 2 years ago

Was this helpful?