Articles

A discursive source of knowledge on Information Security including topics on Pentesting,
Bug Bounty, Red Teaming, Threat Hunting, Hacking Stories, and more.

A Hacker’s Guide to Subdomain Enumeration

A Hacker’s Guide to Subdomain Enumeration

Enumeration is key when it comes to hacking; enumerating subdomains leads to discovering many untouched surfaces with vulnerabilities. By understanding how to uncover more hidden subdomains a target has, you can significantly increase coverage, especially when performing Bug Bounty Hunting or Pentesting.

read more