All tools
Tool 03 — Network & Recon

Subdomain Recon

Discover subdomains using passive certificate transparency logs and public DNS datasets. Authorized testing only.

Subdomain Recon

Discover subdomains using passive sources (crt.sh + HackerTarget).

Passive recon only — queries public databases, no direct scanning.

What is subdomain enumeration?

Subdomain enumeration is the process of discovering all subdomains associated with a target domain — for example finding api.example.com, staging.example.com, or admin.example.com when starting with just example.com.

Subdomains matter from a security perspective because they often host older, less-maintained applications, test environments with weaker security configurations, internal services accidentally exposed to the internet, or services running outdated software. Finding them is one of the first steps in any authorized penetration test or bug bounty reconnaissance.

Passive vs. active reconnaissance

There are two broad approaches to subdomain discovery:

How does certificate transparency work?

Every TLS/SSL certificate issued by a trusted Certificate Authority (CA) must be recorded in a public log — this requirement is called Certificate Transparency (CT), defined in RFC 6962. CT logs exist to detect fraudulent or misissued certificates.

A useful side effect: because every certificate must list the domain name(s) it covers, CT logs become a comprehensive index of every subdomain that has ever had a certificate issued for it. The crt.sh service aggregates these logs and makes them searchable — which is exactly what this tool uses.

Common subdomain types and their risks

staging / dev / test
Often run older software, skip WAF rules, or expose debug endpoints
admin / portal / dashboard
Management interfaces — if exposed, often the highest-value targets
api / v1 / v2
API endpoints that may lack the same auth as the main app
mail / smtp / webmail
Email infrastructure — open relays and MX misconfigs
vpn / remote / citrix
Remote access services — high value if credentials are weak
old / legacy / 2020
Forgotten applications, rarely patched, easy wins for attackers

What to do with subdomain results

← Back to all tools
Copied!