How to gather sub-domains for the target domain for threat assessment?

Secruit makes it easy for security researchers to gather sub-domains for the target domain by integrating multiple tools into the platform's toolsuite.

 

The traditional way for sub-domain reconnaissance

DNS Dumpster is the passive way of doing the research.

 

Screengrab DNS Dumpster

 

For example if you run DNS Dumpster on Tesla.com you get the following 60 subdomains.

 

DNS Dumpster scan of Tesla.com

 

Sub-domain reconnaissance with Contynuiti

Step 1: Select Target

 

Initiate target reconnaissance with Contynuiti

 

Step 2: Add

 

Retrieve target list with Subdomain reconnaissance

 

Step 3: Review the list of "Assets" or sub-domains

<PLACEHOLDER>

 

As noted, Secruit reconnaisance delivers more accurate and complete sub-domain list. Once you click on any of the assets or sub-domains you will get all relevant information for that asset.

 

The primary benefit of Contynuiti's reconnaissance is a more complete assessment of the target, to get the best value in the security research.

 

To join the early rollout on the Contynuiti platform email [email protected] or contact us here.

 

By using this website you agree to our Cookie Policy.

Cookie Settings

We use cookies to improve user experience. Choose what cookie categories you allow us to use. You can read more about our Cookie Policy by clicking on Cookie Policy below.

These cookies enable strictly necessary cookies for security, language support and verification of identity. These cookies can’t be disabled.

These cookies collect data to remember choices users make to improve and give a better user experience. Disabling can cause some parts of the site to not work properly.

These cookies help us to understand how visitors interact with our website, help us measure and analyze traffic to improve our service.

These cookies help us to better deliver marketing content and customized ads.