Skip to main contentSkip to main content
Room Banner
Back to all walkthroughs
Room Icon

Subdomain Enumeration

Premium room

Learn the various ways of discovering subdomains to expand your attack surface of a target.

easy

30 min

192,371

User profile photo.
User profile photo.

To access material, start machines and answer questions login.

Subdomain enumeration is the process of finding valid subdomains for a domain, but why do we do this? We do this to expand our attack surface to try and discover more potential points of vulnerability.

We will explore three different subdomain enumeration methods: Brute Force, (Open-Source Intelligence) and Virtual Host.

Start the machine and then move onto the next task.
Answer the questions below
What is a subdomain enumeration method beginning with B?

What is a subdomain enumeration method beginning with O?

What is a subdomain enumeration method beginning with V?

Ready to learn Cyber Security?

The Subdomain Enumeration room is only available for premium users. Signup now to access more than 500 free rooms and learn cyber security through a fun, interactive learning environment.

Already have an account? Log in

We use cookies to ensure you get the best user experience. For more information see our cookie policy.