Subdomain Enumeration

Added on April 5, 2026

Subdomain enumeration is the process of identifying all subdomains for a given domain. This can be useful for a variety of purposes, such as identifying potential targets for an attack, or simply for organizational purposes. Subdomain enumeration methods:

OSINT: SSL/TLS Certificates

When an SSL/TLS (Secure Sockets Layer/Transport Layer Security) certificate is created for a domain by a CA (Certificate Authority), CA's take part in what's called "Certificate Transparency (CT) logs".

The purpose of Certificate Transparency logs is to stop malicious and accidentally made certificates from being used. We can use this service to our advantage to discover subdomains belonging to a domain, sites like https://crt.sh and https://ui.ctsearch.entrust.com/ui/ctsearchui offer a searchable database of certificates that shows current and historical results.

Google Dorking

site:*.tryhackme.com -site:www.tryhackme.com Gives all subdomains except the www.tryhackme.com

DNS Bruteforce

Bruteforce DNS enumeration is the method of trying millions of different possible subdomains from a pre-defined list of commonly used subdomains. Use tools like sublist3r. dnsresolve for this. Some subdomains aren't always hosted in publically accessible DNS results, such as development versions of a web application or administration portals. Instead, the DNS record could be kept on a private DNS server or recorded on the developer's machines in their /etc/hosts file which maps domain names to IP addresses. In this cases fuzzing the subdomain might work

ffuf -w wordlist -H "Host: FUZZ.domain" -u taget -fs filter-size

Above fuzzing often gives positive response for most queries, as a not-found template (with status code 200, filter out these result by using their Content-Length of the response