To access material, start machines and answer questions login.
Subdomain enumeration is the process of finding valid subdomains for a domain, but why do we do this? We do this to expand our attack surface to try and discover more potential points of vulnerability.
We will explore three different subdomain enumeration methods: Brute Force, (Open-Source Intelligence) and Virtual Host.
Start the machine and then move onto the next task.
We will explore three different subdomain enumeration methods: Brute Force, (Open-Source Intelligence) and Virtual Host.
Start the machine and then move onto the next task.
Answer the questions below
What is a subdomain enumeration method beginning with B?
What is a subdomain enumeration method beginning with O?
What is a subdomain enumeration method beginning with V?
Ready to learn Cyber Security?
The Subdomain Enumeration room is only available for premium users. Signup now to access more than 500 free rooms and learn cyber security through a fun, interactive learning environment.
Already have an account? Log in
