Domain Information
(Infrastructure Based Enumeration)
Last updated
(Infrastructure Based Enumeration)
Last updated
This type of information is gathered passively without direct and active scans. In other words, we remain hidden and navigate as "customers" or "visitors" to avoid direct connections to the company that could expose us.
The first thing we should do is scrutinize the company's main website
Then, we should read through the texts, keeping in mind what technologies and structures are needed for these services
The first point of presence on the Internet may be the SSL certificate
from the company's main website. Often, such a certificate includes more than just a subdomain, and this means that the certificate is used for several domains, and these are most likely still active
Another source to find more subdomains is .
Next, we can identify the hosts directly accessible from the Internet and not hosted by third-party providers (This is because we are not allowed to test the hosts without the permission of third-party providers)
Once we see which hosts can be investigated further, we can generate a list of IP addresses with a minor adjustment to the cut
command and run them through Shodan
Now, we can display all the available DNS records where we might find more hosts.