![Kali Linux:An Ethical Hacker's Cookbook](https://wfqqreader-1252317822.image.myqcloud.com/cover/618/36700618/b_36700618.jpg)
上QQ阅读APP看书,第一时间看更新
Subbrute
Next we will install subbrute. It is amazingly fast and provides an extra layer of anonymity as it uses public resolvers to brute force the subdomains:
- The command here is again simple:
git clone https://github.com/TheRook/subbrute.git
The following screenshot shows the preceding command:
![](https://epubservercos.yuewen.com/364BC0/19470402501612306/epubprivate/OEBPS/Images/9c9e4e3b-1ffa-436d-a8a3-e9cc7a7db617.png?sign=1738803027-VAe0A3RyY16qWLQirn0AIYhTUJsLpyj0-0-bf2cfc2096c6bca8a423ced236910014)
- Or you can download and save it from https://github.com/TheRook/subbrute.
- Once the installation is complete we will need a wordlist for it to run for which we can download dnspop's list. This list can be used in the previous recipe too: https://github.com/bitquark/dnspop/tree/master/results.
- Once both are set up we browse into the subbrute's directory and run it using the following command:
./subbrute.py
- To run it against a domain with our wordlist we use the following command:
./subbrute.py -s /path/to/wordlist hostname.com