SlideShare a Scribd company logo
SUBDOMAIN ENUMERATION
By,
MITHRAN
GETTING SUBDOMAINS FROM “https://bgp.he.net/”
The website can take:
 name of the company
 domain name
We can get following information from the site:
 ASN of the company
 The range of IP address that the company owns
 list of subdomains of the company
 nameservers of the company
 whois information
We have extracted these information from the site, out of which two nameservers are
important. Also, we can scan these IPs in the next step of pentesting to see which
ports are open.
Note: This website does not provide information about domains/subdomains that are
hosted in cloud platforms like amazon, etc. Since, out target is hosted in amazon, we
could not get much information about subdomains. Nevertheless, this is a good
starting points to gather information about a target.
GETTING SUBDOMAINS USING THE WEBSITE
“https://crt.sh”
The website can take:
 name of the company. Ex. “tsp”
 root domain of the company. Ex. “tsp.gov”
 Certificate fingerprint of the company, amongst others
In return, the site provides us with the following:
 various other root domains associated with the company
 subdomains of the company
The website returns the following information amongst many others, all of which
cannot be shown in the screenshot
As a pentester, we will need to gather these information in a text file. Here are the
steps to do all these in the command line.
The json file is of the json format:
jq is a json parser that is used to deal with json files. Above is the screenshot of first
element present in json array. We will need to parse this file and extract all the
subdomains of “tsp.gov” from it to a new file. I have created this basic command for
this purpose.
The above command parses the json_file.txt using the jq command. It extract all the
common_name from the array(here. common_name represent subdomain). From the
array of extracted subdomains, the grep command will search for all unique
subdomains of the target root domain (“.tst.gov”), and extract them to the
“final_subdomain” file.
This site has given us a total of “49” subdomains in a text file.
VIRUSTOTAL (https://www.virustotal.com/gui/)
Type in the domain name in the search bar in the search section
The subdomain are listed in the “RELATION” section
There is a copy bar at the right side as shown in the above image.Copy and paste it in
a file for further processing.
We can use the api provided by virustotal to get all the subdomains using command
line as shown. However, this will only give the sub-domain for the target domain, and
will not provide recursive subdomains. Try and come up with a solution of this to
automate the process.
Add the -o output.txt to save the information
Log into the site, and copy the api key provided in the key section into the avove
command. Also, replace the “{domain}” with the target domain.
Output of subdomains from the GUI of virustotal:
Virus total has given a total of 39 subdomains.
DNSDUMPSTER(https://dnsdumpster.com/)
The first thing to look at here is that it gives the information of IP owners in
histogram format.
Total number of subdomain found in this site is 5 as shown below:
SECURITYTRAILS (https://securitytrails.com/)
You will need to log into this site using your work email to gain access to all the
subdomains.
Subdomains can be seen here
Using api to gather subdomains
children_only=false means that even subdomain of subdomain will be returned.
include_inactive=true means that even those domains that has no dns information will
be returned.
This will give us an output in the form of json. Our goal is to create a file with only
subdomain names. The command below will help us do that.
jq will extract the subdomains from the json file. Here, subdomains are returned
without the domain part. Therefore, we use awk to add the remainder to the
subdomains and output the final_output file.
The final output file is of the following format:
Total number of subdomains found using this site:
SUBDOMAIN FINDER
(https://subdomainfinder.c99.nl/)
This site can be very useful as it provides a list of all the scans be dates. As a pentester,
we can make use of this facility to find the list of subdomain from earlier and can use
this step for domain takeover.
It can do may other interesting things as shown in the link https://api.c99.nl/
The GUI shows all the subdomains, but subdomains without IP cannot be copied from
the site.
We need to manually copy all the subdomain into a file. The site offers paid API.
Now, we need to convert this into a file containing only the domain names.
The final output is in the format given below:
Total number of subdomains gathered from this site are 65:
URLSCAN (https://urlscan.io/)
This site is mostly useful for gathering various other informations about the domain. It
also gives subdomains.
TURBOLISTER
This tool is the fork of “SUBLIST3R” which is used to find domain using both
scrapping techinique and bruteforce technique. We will use the scrapping technique to
find the subdomains which is run by default. This is an extension which provides
various other functionality to deal with the output.
Search Engine and Sites used by Sublist3r/Turbolist3r
 BaiduEnum
 YahooEnum
 GoogleEnum
 BingEnum
 AskEnum
 NetcraftEnum
 DNSdumpster
 Virustotal
 ThreatCrowd
 CrtSearch
 PassiveDNS
How does Sublist3r/Turbolist3r scrap for subdomains ?
 SEARCH ENGINE MODULE
This module automatically searches from a domain in the given search engine upto “n”
pages. From each page, it extracts unique urls, and processes it to find subdomains.
 SITE MODULE
This module extracts the subdomains as provided by the given site.
The tool can be downloaded from this github repository.
The tool requires three dependencies to run:
1) dnslib
2) requests
3) argparse
The three dependencies can be downloaded as shown in the screenshots below:
Running the tool:
The output of the tool is as shown:
Total number of subdomain given by this tool:
Note: There are better tools available in the market with better source of finding
domains. Do not use this tool.
ASSETFINDER
We will be using tomnomnom’s assetfinder which can be downloaded from the link
https://github.com/tomnomnom/assetfinder
What modules does the tool use?
 Virustotal
 urlscan.io
 crtsh
 certpotter (https://sslmate.com/certspotter/)
 bufferoverrun (https://dns.bufferover.run/dns) (not found on web)
 facebook api (https://graph.facebook.com/certificates?fields=domains)
 spyse (using both subdomain and subdomain endpoints)
 hackertarget (https://hackertarget.com/)
 threatcrowd
 web archeve (also called waybackmachine)
(https://archive.org/help/wayback_api.php)

INSTALLING THE TOOL
Running the tool:
Result given by the tool:
Total number of subdomains found:
AMASS
TYPES OF FUNCTIONALITY PROVIDED MY AMASS
 INTEL (for finding root domain and other high level information)
 ENUM (for finding subdomains)
1. DEFAULT (passive mode and active mode)
2. BRUTE
We can checkout all the api’s, certificates, etc using the command “amass enum -list”
There are various modules used in amass:
SETTING UP THE CONFIG FILE IN AMASS
Installing from the commandline
The binary shoud be present in $GOPATH/bin
Copy the content of config.ini file from
https://github.com/0xdekster/deksterecon/blob/master/amass-config.ini to the above
created file.
You will first have to create an API key for the third-party sites. Once the key is
created, open the config file and paste the api key to the respective site.
BRUTE FORCING THE SUBDOMAIN
TOOL:MASSDNS
tool: dnsvalidator (https://github.com/vortexau/dnsvalidator)
use dns validator to find dns resolvers before using bruteforce
REFERENCES
https://www.dionach.com/blog/how-to-use-owasp-amass-an-extensive-tutorial/
https://crt.sh/?q=tsp.gov
https://stackoverflow.com/questions/13778273/find-unique-lines
https://rashahacks.com/enumerate-root-domain-names/
https://www.youtube.com/watch?v=m9dhrq9iRHA&list=LL&index=1&t=356s
https://www.virustotal.com/gui/home/upload
https://dnsdumpster.com/
https://securitytrails.com/
https://docs.securitytrails.com/reference/domain-subdomains
https://subdomainfinder.c99.nl/
https://api.c99.nl/
https://urlscan.io/
https://hub.steampipe.io/plugins/turbot/urlscan/tables/urlscan_searchhttps://github.com/fleetcaptain/Tur
bolist3r/blob/master/turbolist3r.py#L737
https://github.com/aboul3la/Sublist3r/blob/master/sublist3r.py#L273
https://github.com/tomnomnom/assetfinder
https://www.geeksforgeeks.org/assetfinder-find-domains-and-subdomains-related-to-a-given-domain/
https://twitter.com/ofjaaah/status/1299017775545974785?lang=enhttps://graph.facebook.com/certificat
es?fields=domains
https://spyse-dev.readme.io/reference/quick-start
https://pentestlab.blog/2020/06/15/spyse-a-cyber-security-search-engine/
https://hackertarget.com/
https://www.threatcrowd.org/
https://archive.org/help/wayback_api.php
https://blog.intigriti.com/2021/06/08/hacker-tools-amass-hunting-for-subdomains/
https://www.youtube.com/watch?v=DbjVL-bqfl4
https://github.com/ykankaya/Amass-1/blob/master/examples/config.ini
https://hackerassociate.medium.com/amass-new-config-file-update-e95d09b6eb70
https://github.com/owasp-amass/amass/blob/master/examples/datasources.yaml
https://github.com/owasp-amass/amass

More Related Content

Similar to Subdomain enumeration is a crucial phase in cybersecurity, particularly during reconnaissance and vulnerability assessment processes.

Exploring Async PHP (SF Live Berlin 2019)
Exploring Async PHP (SF Live Berlin 2019)Exploring Async PHP (SF Live Berlin 2019)
Exploring Async PHP (SF Live Berlin 2019)
dantleech
 
GUIDE - Migrating AWS EBS backed AMI's between Regions
GUIDE - Migrating AWS EBS backed AMI's between RegionsGUIDE - Migrating AWS EBS backed AMI's between Regions
GUIDE - Migrating AWS EBS backed AMI's between Regions
Rob Linton
 
Cracking CTFs The Sysbypass CTF
Cracking CTFs The Sysbypass CTFCracking CTFs The Sysbypass CTF
Cracking CTFs The Sysbypass CTF
Riyaz Walikar
 
Book
BookBook
Book
luis_lmro
 
Backtrack Manual Part4
Backtrack Manual Part4Backtrack Manual Part4
Backtrack Manual Part4
Nutan Kumar Panda
 
Fargate 를 이용한 ECS with VPC 1부
Fargate 를 이용한 ECS with VPC 1부Fargate 를 이용한 ECS with VPC 1부
Fargate 를 이용한 ECS with VPC 1부
Hyun-Mook Choi
 
Creating a modern web application using Symfony API Platform, ReactJS and Red...
Creating a modern web application using Symfony API Platform, ReactJS and Red...Creating a modern web application using Symfony API Platform, ReactJS and Red...
Creating a modern web application using Symfony API Platform, ReactJS and Red...
Jesus Manuel Olivas
 
The Enterprise Wor/d/thy/Press
The Enterprise Wor/d/thy/PressThe Enterprise Wor/d/thy/Press
The Enterprise Wor/d/thy/Press
Jeroen van Dijk
 
appledoc_style
appledoc_styleappledoc_style
appledoc_style
Ziku Spartan
 
Searching Shodan For Fun And Profit
Searching Shodan For Fun And ProfitSearching Shodan For Fun And Profit
Searching Shodan For Fun And Profit
E Hacking
 
How to deploy and scale your meteor apps
How to deploy and scale your meteor appsHow to deploy and scale your meteor apps
How to deploy and scale your meteor apps
Designveloper
 
Example Cosmos SDK Application Tutorial
Example Cosmos SDK Application TutorialExample Cosmos SDK Application Tutorial
Example Cosmos SDK Application Tutorial
Jim Yang
 
AWS DataSync.pdf
AWS DataSync.pdfAWS DataSync.pdf
AWS DataSync.pdf
Manas Mondal
 
Spraykatz installation & basic usage
Spraykatz installation & basic usageSpraykatz installation & basic usage
Spraykatz installation & basic usage
Sylvain Cortes
 
Cracking CTFs - Sysbypass CTF Walkthrough
Cracking CTFs - Sysbypass CTF WalkthroughCracking CTFs - Sysbypass CTF Walkthrough
Cracking CTFs - Sysbypass CTF Walkthrough
n|u - The Open Security Community
 
Setting up the hyperledger composer in ubuntu
Setting up the hyperledger composer in ubuntuSetting up the hyperledger composer in ubuntu
Setting up the hyperledger composer in ubuntu
kesavan N B
 
Apache Web Server Setup 2
Apache Web Server Setup 2Apache Web Server Setup 2
Apache Web Server Setup 2
Information Technology
 
SaltConf14 - Ben Cane - Using SaltStack in High Availability Environments
SaltConf14 - Ben Cane - Using SaltStack in High Availability EnvironmentsSaltConf14 - Ben Cane - Using SaltStack in High Availability Environments
SaltConf14 - Ben Cane - Using SaltStack in High Availability Environments
SaltStack
 
Amazon EMR Masterclass
Amazon EMR MasterclassAmazon EMR Masterclass
Amazon EMR Masterclass
Ian Massingham
 
Amazon EMR Masterclass
Amazon EMR MasterclassAmazon EMR Masterclass
Amazon EMR Masterclass
Amazon Web Services
 

Similar to Subdomain enumeration is a crucial phase in cybersecurity, particularly during reconnaissance and vulnerability assessment processes. (20)

Exploring Async PHP (SF Live Berlin 2019)
Exploring Async PHP (SF Live Berlin 2019)Exploring Async PHP (SF Live Berlin 2019)
Exploring Async PHP (SF Live Berlin 2019)
 
GUIDE - Migrating AWS EBS backed AMI's between Regions
GUIDE - Migrating AWS EBS backed AMI's between RegionsGUIDE - Migrating AWS EBS backed AMI's between Regions
GUIDE - Migrating AWS EBS backed AMI's between Regions
 
Cracking CTFs The Sysbypass CTF
Cracking CTFs The Sysbypass CTFCracking CTFs The Sysbypass CTF
Cracking CTFs The Sysbypass CTF
 
Book
BookBook
Book
 
Backtrack Manual Part4
Backtrack Manual Part4Backtrack Manual Part4
Backtrack Manual Part4
 
Fargate 를 이용한 ECS with VPC 1부
Fargate 를 이용한 ECS with VPC 1부Fargate 를 이용한 ECS with VPC 1부
Fargate 를 이용한 ECS with VPC 1부
 
Creating a modern web application using Symfony API Platform, ReactJS and Red...
Creating a modern web application using Symfony API Platform, ReactJS and Red...Creating a modern web application using Symfony API Platform, ReactJS and Red...
Creating a modern web application using Symfony API Platform, ReactJS and Red...
 
The Enterprise Wor/d/thy/Press
The Enterprise Wor/d/thy/PressThe Enterprise Wor/d/thy/Press
The Enterprise Wor/d/thy/Press
 
appledoc_style
appledoc_styleappledoc_style
appledoc_style
 
Searching Shodan For Fun And Profit
Searching Shodan For Fun And ProfitSearching Shodan For Fun And Profit
Searching Shodan For Fun And Profit
 
How to deploy and scale your meteor apps
How to deploy and scale your meteor appsHow to deploy and scale your meteor apps
How to deploy and scale your meteor apps
 
Example Cosmos SDK Application Tutorial
Example Cosmos SDK Application TutorialExample Cosmos SDK Application Tutorial
Example Cosmos SDK Application Tutorial
 
AWS DataSync.pdf
AWS DataSync.pdfAWS DataSync.pdf
AWS DataSync.pdf
 
Spraykatz installation & basic usage
Spraykatz installation & basic usageSpraykatz installation & basic usage
Spraykatz installation & basic usage
 
Cracking CTFs - Sysbypass CTF Walkthrough
Cracking CTFs - Sysbypass CTF WalkthroughCracking CTFs - Sysbypass CTF Walkthrough
Cracking CTFs - Sysbypass CTF Walkthrough
 
Setting up the hyperledger composer in ubuntu
Setting up the hyperledger composer in ubuntuSetting up the hyperledger composer in ubuntu
Setting up the hyperledger composer in ubuntu
 
Apache Web Server Setup 2
Apache Web Server Setup 2Apache Web Server Setup 2
Apache Web Server Setup 2
 
SaltConf14 - Ben Cane - Using SaltStack in High Availability Environments
SaltConf14 - Ben Cane - Using SaltStack in High Availability EnvironmentsSaltConf14 - Ben Cane - Using SaltStack in High Availability Environments
SaltConf14 - Ben Cane - Using SaltStack in High Availability Environments
 
Amazon EMR Masterclass
Amazon EMR MasterclassAmazon EMR Masterclass
Amazon EMR Masterclass
 
Amazon EMR Masterclass
Amazon EMR MasterclassAmazon EMR Masterclass
Amazon EMR Masterclass
 

More from Varun Mithran

HVAC design for health care facilities is all about providing a safer environ...
HVAC design for health care facilities is all about providing a safer environ...HVAC design for health care facilities is all about providing a safer environ...
HVAC design for health care facilities is all about providing a safer environ...
Varun Mithran
 
JWT stands for JSON Web Token. It's a compact, URL-safe means of representing...
JWT stands for JSON Web Token. It's a compact, URL-safe means of representing...JWT stands for JSON Web Token. It's a compact, URL-safe means of representing...
JWT stands for JSON Web Token. It's a compact, URL-safe means of representing...
Varun Mithran
 
SARS-CoV-2 is the virus responsible for the COVID-19 pandemic that started in...
SARS-CoV-2 is the virus responsible for the COVID-19 pandemic that started in...SARS-CoV-2 is the virus responsible for the COVID-19 pandemic that started in...
SARS-CoV-2 is the virus responsible for the COVID-19 pandemic that started in...
Varun Mithran
 
Cross-site request forgery (also known as CSRF) is a web vulnerability that a...
Cross-site request forgery (also known as CSRF) is a web vulnerability that a...Cross-site request forgery (also known as CSRF) is a web vulnerability that a...
Cross-site request forgery (also known as CSRF) is a web vulnerability that a...
Varun Mithran
 
Coronavirus genomes and subgenomes encode six ORFs
Coronavirus genomes and subgenomes encode six ORFsCoronavirus genomes and subgenomes encode six ORFs
Coronavirus genomes and subgenomes encode six ORFs
Varun Mithran
 
Bug Bounty Blueprint : A Beginner's Guide
Bug Bounty Blueprint : A Beginner's GuideBug Bounty Blueprint : A Beginner's Guide
Bug Bounty Blueprint : A Beginner's Guide
Varun Mithran
 
There are three main types of ducting used within domestic ventilation system...
There are three main types of ducting used within domestic ventilation system...There are three main types of ducting used within domestic ventilation system...
There are three main types of ducting used within domestic ventilation system...
Varun Mithran
 
SOC Analyst Guide For Beginners SOC analysts work as members of a managed sec...
SOC Analyst Guide For Beginners SOC analysts work as members of a managed sec...SOC Analyst Guide For Beginners SOC analysts work as members of a managed sec...
SOC Analyst Guide For Beginners SOC analysts work as members of a managed sec...
Varun Mithran
 
Incident handling is a clearly defined set of procedures to manage and respon...
Incident handling is a clearly defined set of procedures to manage and respon...Incident handling is a clearly defined set of procedures to manage and respon...
Incident handling is a clearly defined set of procedures to manage and respon...
Varun Mithran
 
TOP 100 Vulnerabilities Step-by-Step Guide Handbook
TOP 100 Vulnerabilities Step-by-Step Guide HandbookTOP 100 Vulnerabilities Step-by-Step Guide Handbook
TOP 100 Vulnerabilities Step-by-Step Guide Handbook
Varun Mithran
 
BASIC ECG RTHYM - STEMI- SVT -A FIB- SINUS BRADYCARDIA -TACHYCARDIA
BASIC ECG RTHYM - STEMI- SVT -A FIB- SINUS BRADYCARDIA -TACHYCARDIABASIC ECG RTHYM - STEMI- SVT -A FIB- SINUS BRADYCARDIA -TACHYCARDIA
BASIC ECG RTHYM - STEMI- SVT -A FIB- SINUS BRADYCARDIA -TACHYCARDIA
Varun Mithran
 
BASIC ECG RTHYM RAJI.pptx ACLS PREPARATION
BASIC ECG RTHYM RAJI.pptx ACLS PREPARATIONBASIC ECG RTHYM RAJI.pptx ACLS PREPARATION
BASIC ECG RTHYM RAJI.pptx ACLS PREPARATION
Varun Mithran
 
Apply now for "Raspberry Pi for beginners" video course as Self learning
Apply now for "Raspberry Pi for beginners" video course as  Self learning  Apply now for "Raspberry Pi for beginners" video course as  Self learning
Apply now for "Raspberry Pi for beginners" video course as Self learning
Varun Mithran
 

More from Varun Mithran (13)

HVAC design for health care facilities is all about providing a safer environ...
HVAC design for health care facilities is all about providing a safer environ...HVAC design for health care facilities is all about providing a safer environ...
HVAC design for health care facilities is all about providing a safer environ...
 
JWT stands for JSON Web Token. It's a compact, URL-safe means of representing...
JWT stands for JSON Web Token. It's a compact, URL-safe means of representing...JWT stands for JSON Web Token. It's a compact, URL-safe means of representing...
JWT stands for JSON Web Token. It's a compact, URL-safe means of representing...
 
SARS-CoV-2 is the virus responsible for the COVID-19 pandemic that started in...
SARS-CoV-2 is the virus responsible for the COVID-19 pandemic that started in...SARS-CoV-2 is the virus responsible for the COVID-19 pandemic that started in...
SARS-CoV-2 is the virus responsible for the COVID-19 pandemic that started in...
 
Cross-site request forgery (also known as CSRF) is a web vulnerability that a...
Cross-site request forgery (also known as CSRF) is a web vulnerability that a...Cross-site request forgery (also known as CSRF) is a web vulnerability that a...
Cross-site request forgery (also known as CSRF) is a web vulnerability that a...
 
Coronavirus genomes and subgenomes encode six ORFs
Coronavirus genomes and subgenomes encode six ORFsCoronavirus genomes and subgenomes encode six ORFs
Coronavirus genomes and subgenomes encode six ORFs
 
Bug Bounty Blueprint : A Beginner's Guide
Bug Bounty Blueprint : A Beginner's GuideBug Bounty Blueprint : A Beginner's Guide
Bug Bounty Blueprint : A Beginner's Guide
 
There are three main types of ducting used within domestic ventilation system...
There are three main types of ducting used within domestic ventilation system...There are three main types of ducting used within domestic ventilation system...
There are three main types of ducting used within domestic ventilation system...
 
SOC Analyst Guide For Beginners SOC analysts work as members of a managed sec...
SOC Analyst Guide For Beginners SOC analysts work as members of a managed sec...SOC Analyst Guide For Beginners SOC analysts work as members of a managed sec...
SOC Analyst Guide For Beginners SOC analysts work as members of a managed sec...
 
Incident handling is a clearly defined set of procedures to manage and respon...
Incident handling is a clearly defined set of procedures to manage and respon...Incident handling is a clearly defined set of procedures to manage and respon...
Incident handling is a clearly defined set of procedures to manage and respon...
 
TOP 100 Vulnerabilities Step-by-Step Guide Handbook
TOP 100 Vulnerabilities Step-by-Step Guide HandbookTOP 100 Vulnerabilities Step-by-Step Guide Handbook
TOP 100 Vulnerabilities Step-by-Step Guide Handbook
 
BASIC ECG RTHYM - STEMI- SVT -A FIB- SINUS BRADYCARDIA -TACHYCARDIA
BASIC ECG RTHYM - STEMI- SVT -A FIB- SINUS BRADYCARDIA -TACHYCARDIABASIC ECG RTHYM - STEMI- SVT -A FIB- SINUS BRADYCARDIA -TACHYCARDIA
BASIC ECG RTHYM - STEMI- SVT -A FIB- SINUS BRADYCARDIA -TACHYCARDIA
 
BASIC ECG RTHYM RAJI.pptx ACLS PREPARATION
BASIC ECG RTHYM RAJI.pptx ACLS PREPARATIONBASIC ECG RTHYM RAJI.pptx ACLS PREPARATION
BASIC ECG RTHYM RAJI.pptx ACLS PREPARATION
 
Apply now for "Raspberry Pi for beginners" video course as Self learning
Apply now for "Raspberry Pi for beginners" video course as  Self learning  Apply now for "Raspberry Pi for beginners" video course as  Self learning
Apply now for "Raspberry Pi for beginners" video course as Self learning
 

Recently uploaded

Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
Laura Szabó
 
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
ukwwuq
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
wolfsoftcompanyco
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
SEO Article Boost
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
cuobya
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
Danica Gill
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
uehowe
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
ysasp1
 
Design Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptxDesign Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptx
saathvikreddy2003
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
Trish Parr
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
zoowe
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
uehowe
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
cuobya
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
uehowe
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
bseovas
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
davidjhones387
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
cuobya
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
hackersuli
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
fovkoyb
 
Explore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories SecretlyExplore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories Secretly
Trending Blogers
 

Recently uploaded (20)

Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
 
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
 
Design Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptxDesign Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptx
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
 
Explore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories SecretlyExplore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories Secretly
 

Subdomain enumeration is a crucial phase in cybersecurity, particularly during reconnaissance and vulnerability assessment processes.