Sublist3r | TryHackMe

Sublist3r | TryHackMe

Learn how to find subdomains with Sublist3r!

ROOM INFO

.NAME:Sublist3r .Profile: tryhackme.com Description:Learn how to find subdomains with Sublist3r!

  • Task 1: Intro

As you begin this room, read the disclaimer and how the tool is been used first before proceeding, No rocket science here...lol

Lets begin:

Sublist3r is a fantastic python script that allows us to perform quick and easy recon against our target, discovering various subdomains associated with the websites/domains in scope.

Resource used: .Sublist3r tool (github.com/aboul3la/Sublist3r) .pip python3

sublist3rTask1.png

  • Task 2: Installation

So you are asked to install Sublist3r in the opt directory, you will need to have Python 3.4.x (or higher) or Python 2.7.x installed. We'll be using Python 3 commands. if sure you have it firstly. Now copy the Github repository for Sublist3r, you will be installing it the opt directory, The standard directory for optional package installation on any linux distro you have.

Firstly, lets change to our opt directory: cd /opt

Cone the Sublist3r repository into opt using "git clone": git clone https://github.com/aboul3la/Sublist3r

.Move to the Sublist3r directory, you just created: use command to see the directory then cd Sublist3er.

Finally, install the requirements for running Sublist3r: pip3 install -r requirements.txt

  • Task 3: Switchboard

Sublist3r has a number of switches that we can use to do everything from setting our target domain to changing which engine to use for searching. You can access this via running Sublist3r with only the help switch: -h (python3 sublist3r.py -h)

sublist3rhelp.png You could see an example of how it is used in a website like google.com

sublist3rTASK3.png Use the Sublist3r help command to get the switches/option

  • Task 4: Scans away!

Time to scan, let's run Sublit3r against a target company domain and learn about some common domains! You can also run this via the recon tool at dnsdumpster or you can also just download my results from running sublist3r.

Choose your choice but I personally would suggest go for the download if you dont know how to use dnsdumpster for recon!

Let's run sublist3r now against nbc.com, a fairly large American news company. Run this now with the command: Run python3 sublist3r.py -d nbc.com -o sub-output-nbc.txt sublist3rRecon.png

Look through the dns record results you have and pay close attention

.Once that completes open up your results and take a look through them. Email domains are almost always interesting and typically have an email portal (usually Outlook) located at them. Which subdomain is likely the email portal? mail sublist3r1.png

.Administrative control panels should never be exposed to the internet! Which subdomain is exposed that shouldn't be? admin

sublist3r2.png

.Company blogs can sometimes reveal information about internal activities, which subdomain has the company blog at it? blog

sublist3r3.png

.Development sites are often vulnerable to information disclosure or full-blown attacks. Two developer sites are exposed, which one is associated directly with web development? dev-www

sublist3r4.png

.Customer and employee help desk portals can often reveal internal nomenclature and other potentially sensitive information, which dns record might be a helpdesk portal? help

sublist3r5.png

.Single sign-on is a feature commonly used in corporate domains, which dns record is directly associated with this feature? Include both parts of this subdomain separated by a period.sslologin.stg

sublist3r6.png Lastly this needs some google dorking, we were told "NBC produced a popular sitcom about typical office work environment" check out what is "the office" about nbc.com in google.

sublist3rFinal.png

.One last one for fun. NBC produced a popular sitcom about typical office work environment, which dns record might be associated with this show? office-words

Good recon mate!!

Hope its helps someone out there...Cheers