Sign Up

Custom subdomain brute-force wordlist from IP ranges

SSL certificates obtained from various hosts may contain valuable information that could be utilized to create a wordlist and then find additional hostnames belonging to a specific company's root domain

Complexity: basic

Category: Attack Surface Management

Workflow

Custom subdomain brute-force wordlist from IP ranges Workflow in the workflow editor

Custom subdomain brute-force wordlist from IP ranges

Tools

Setup

You can set up this workflow by changing following input value:

  • TARGET - provide file containing company's CIDR or IP-range, as a target
Workflow target setup for Custom subdomain brute-force wordlist from IP ranges workflow

Workflow Targets Setup

Execution and results

After setup workflow is ready to be executed. Once workflow's last node, recursively-cat-all script, is finished result can be viewed and downloaded.

recursively-cat-all script will contain the wordlists gathered from cero parallel execution for each cidr-list.

workflow results in the workflow editor

Try it out!

This workflow is available in the Library, you can copy it and execute it immediately!

Improve this workflow