|
Linux: This Book Includes 4 Manuscripts. The Underground Bible to the unix operating System with Tools On Security and Kali Hacking to Understand Computer Programming, Data Science and Command Line Pdf ko'rish
|
bet | 181/203 | Sana | 10.01.2024 | Hajmi | 6,34 Mb. | | #134102 |
Bog'liq Linux This Book Includes 4 Manuscripts The Underground BibleInstalling sublist3r
1) Select the directory you need the tool should be installed using the cd
command.
example@ linuxwar : cd install sublist3 r
2) GitHub is an online repository that makes things easy for programmers
when cloning the application. It is different from package managers because
one can actively contribute to the application using git console.
Here is the command that can be used to install sublist3r
git clone (URL)
3) Now every git folder has a requirements file that will help the system to
install the other tools that are needed to be installed to make the software
work. These are called dependencies. Hackers should have a good
understanding of this because of many encounter errors.
We will let you understand dependencies with a perfect example. Imagine
that you are trying to install a java application like Android studio. If there
is no java installed in the system you cannot install and use the Android
studio. That is what a dependency stands for.
In the next section, we will explain the working of the sublist3r. Follow
along to learn about it in detail.
Starting the sublist3r tool
Run the following command to start the subdomain searching tool .
example@ linuxwar : run sublist3r
We will get a lot of options that can be chosen from this tool. We will even
have a help section when entered -h that explains the commands that can be
used.
Here are the functionalities that this tool can perform in detail:
a) Domain -d
You can enter this parameter to insert the domain you want to find
subdomains for.
b) Brute force
This parameter can be used to start a brute force attack using a lot of
domain lists that are entered in a text file. This can be particularly used
when you have a lot of domains to test.
c) Ports
Ports are the functionalities that can be used for easy sub domain
referencing. This parameter can help the user find vulnerable subdomains
using the open ports .
Apart from these basic parameters, you can use output functionality to get
the results into a text file from a shell interface.
We will now give some example commands that will let you understand
subdomain enumeration in detail:
1) Python sublist3r.py -d
amazon.com
This command will start an execution that will display all the subdomains
that are present after using the
2) You can use this command to brute force the first 100 domains that are
present in the text file.
python sublist3r text.txt
Through these simple techniques, you can find subdomains. After finding
the subdomains list you can use techniques like a recon to further dig a lot
of information about them.
While trying to hack a web application, hackers should prefer this
methodology to easily catch the easy way to get onto the application. That's
it we have completed a brief explanation about the available web
application tools and in the next section, we will start a detailed explanation
about network tools. Let's go!
|
|
Bosh sahifa
Aloqalar
Bosh sahifa
Linux: This Book Includes 4 Manuscripts. The Underground Bible to the unix operating System with Tools On Security and Kali Hacking to Understand Computer Programming, Data Science and Command Line
|