Domained : Multi Tool Subdomain Enumeration

Domained is a domain name enumeration tool. The tools contained in it requires Kali Linux (preferred) or Debian 7+ and Recon-ng.

It uses several subdomain enumeration tools and wordlists to create a unique list of subdomains that are passed to EyeWitness for reporting with categorized screenshots, server response headers and signature based default credential checking. (resources are saved to ./bin and output is saved to ./output).

Initial Install

  • Domained tools

python3 domained.py –install

  • Python required modules

sudo pip install -r ./ext/requirements.txt

Other Dependencies

  • ldns library for DNS programming:

sudo apt-get install libldns-dev -y

  • Go Programming Language:

sudo apt-get install golang

NOTE: This is an active recon – only perform on applications that you have permission to test against.

Also Read – Chromepass : Hacking Chrome Saved Passwords

Tools Leveraged

Usage

First Step:
Install Required Python Modules: sudo pip install -r ./ext/requirements.txt
Install Tools: sudo python3 domained.py –install

Example 1: python3 domained.py -d example.com
Uses subdomain example.com (Sublist3r (+subbrute), enumall, Knock, Amass, and SubFinder)

Example 2: python3 domained.py -d example.com -b -p –vpn
Uses subdomain example.com with seclist subdomain list bruteforcing (massdns, subbrute, Sublist3r, Amass, enumall, and SubFinder), adds ports 8443/8080 and checks if on VPN

Example 3: python3 domained.py -d example.com -b –bruteall
Uses subdomain example.com with large-all.txt bruteforcing (massdns, subbrute, Sublist3r, Amass, enumall and SubFinder)

Example 4: python3 domained.py -d example.com –quick
Uses subdomain example.com and only Amass and SubFinder

Example 5: python3 domained.py -d example.com –quick –notify
Uses subdomain example.com, only Amass and SubFinder and notification

Example 6: python3 domained.py -d example.com –noeyewitness
Uses subdomain example.com with no EyeWitness

Note: –bruteall must be used with the -b flag

OptionDescription
–install/–upgradeBoth do the same function – install all prerequisite tools
–vpnCheck if you are on VPN (update with your provider)
–quickUse ONLY Amass and SubFinder
–bruteallBruteforce with JHaddix All.txt List instead of SecList
–freshDelete old data from output folder
–notifySend Pushover or Gmail Notifications
–activeEyeWitness Active Scan
–noeyewitnessNo Eyewitness
-dThe domain you want to preform recon on
-bBruteforce with subbrute/massdns and SecList wordlist
-s nOnly HTTPs domains
-pAdd port 8080 for HTTP and 8443 for HTTPS

Notifications

  • Complete the ext/notifycfg.ini for Pushover or Gmail notifications. (Enable must be set to True)
  • Please see the Pushover API info here and instructions on how to allow less secure apps on your gmail account here

Credit: ccsplit, jafoca, mortymorty, Chan9390, dainok & Apoorv Raj Saxena

R K

Recent Posts

How AI Puts Data Security at Risk

Artificial Intelligence (AI) is changing how industries operate, automating processes, and driving new innovations. However,…

21 hours ago

The Evolution of Cloud Technology: Where We Started and Where We’re Headed

Image credit:pexels.com If you think back to the early days of personal computing, you probably…

5 days ago

The Evolution of Online Finance Tools In a Tech-Driven World

In an era defined by technological innovation, the way people handle and understand money has…

5 days ago

A Complete Guide to Lenso.ai and Its Reverse Image Search Capabilities

The online world becomes more visually driven with every passing year. Images spread across websites,…

6 days ago

How Web Application Firewalls (WAFs) Work

General Working of a Web Application Firewall (WAF) A Web Application Firewall (WAF) acts as…

1 month ago

How to Send POST Requests Using curl in Linux

How to Send POST Requests Using curl in Linux If you work with APIs, servers,…

1 month ago