Subtitle:
Byline:
By N0aziXss | Security Researcher & Penetration Tester
The Subdomain Reconnaissance Challenge
Modern web applications expose 73% more attack surfaces through hidden subdomains (SANS Institute, 2024). Traditional subdomain tools fail because they: Β· Lack HTTP status intelligence Β· Provide no risk context Β· Offer poor visualization
SubSpectre solves this with:
β Intelligent Discovery: DNS brute-forcing with 150+ common prefixes β Comprehensive Analysis: HTTP/HTTPS status checking with detailed metrics β Pentester's Intelligence: Built-in status code guide for security assessments β Professional UX: Rich terminal output with color-coded risk scoring
# Advanced DNS resolution with error handling
def resolve_subdomain(self, subdomain):
"""Professional-grade DNS resolution"""
try:
answers = dns.resolver.resolve(subdomain, 'A')
if answers: # Active subdomain found
return subdomain
except (dns.resolver.NXDOMAIN, dns.resolver.NoAnswer):
return None # Silently skip non-existent subdomainsTechnical Architecture Multi-Phase Scanning Pipeline
graph TD
A[Domain Input] β B[DNS Brute-Force]
B β C{Subdomain Found?}
C β|Yes| D[HTTP/HTTPS Check]
C β|No| E[Skip]
D β F[Status Analysis]
F β G[Risk Categorization]
G β H[Report Generation]Core Components 1. Smart DNS Discovery
Β· 150+ common prefixes: www, admin, api, staging, dev, test Β· Custom wordlist support: Import specialized dictionaries Β· Async resolution: 20+ concurrent threads (configurable)
2. HTTP Intelligence Engine
def check_subdomain_status(self, subdomain):
for protocol in ['http', 'https']: # Check both protocols
url = f"{protocol}://{subdomain}"
try:
response = requests.get(url, timeout=5, allow_redirects=True)
return {
'status_code': response.status_code,
'final_url': response.url, # Track redirects
'content_length': len(response.content),
'response_time': response.elapsed.total_seconds()
}
except requests.exceptions.SSLError:
continue # Try HTTP if HTTPS fails3. Pentester's Status Code Guide
Status Meaning Security Impact 200 OK β Active attack surface 301/302 Redirect π Open redirect potential 401/403 Auth Issues π Authentication bypass 500 Server Error π₯ RCE/SQLi potential
Key Features 1. Comprehensive Reporting
βββββββββββββββββββββββββββββββ
β SCAN RESULTS SUMMARY β
β ββββββββββββββββββββββββββββββ£
β Status Count Percentage
β β
200 42 68.9%
β π 302 8 13.1%
β π 403 5 8.2%
β β 404 4 6.6%
β π₯ 500 2 3.3%
βββββββββββββββββββββββββββββββ2. Professional Output
Β· Color-coded statuses: Green (200), Yellow (3xx), Red (4xx), Magenta (5xx) Β· Detailed metrics: Response times, content sizes, IP addresses Β· JSON export: Complete results for automation pipelines
3. Performance Optimizations
Β· Configurable threading: 20+ concurrent workers (adjustable via -t) Β· Smart timeout handling: Configurable request timeouts Β· DNS caching: Reduced redundant resolutions
Getting Started Installation
git clone https://github.com/N0aziXss/SubSpectre
cd SubSpectre-tools
pip install -r requirements.txtUsage Examples Basic Scan:
python subspectre.py -d example.comAdvanced Reconnaissance:
python subspectre.py -d target.com \
-w custom_wordlist.txt \
-t 50 \
- timeout 10 \
-o scan_results.jsonEnterprise Integration:
# Batch scanning multiple domains
for domain in $(cat domains.txt); do
python subspectre.py -d $domain -o ${domain}_scan.json
doneReal-World Applications For Penetration Testers
Β· Attack Surface Mapping: Discover hidden admin panels and APIs Β· Vulnerability Detection: Identify misconfigurations (403, 500) Β· Redirect Analysis: Find open redirect vulnerabilities
For Bug Bounty Hunters
Β· Subdomain Enumeration: Find forgotten staging environments Β· Asset Discovery: Map organizational infrastructure Β· Status Intelligence: Prioritize targets by response codes
For Blue Teams
Β· Asset Inventory: Monitor owned subdomains Β· Security Monitoring: Detect unauthorized subdomains Β· Compliance Auditing: Verify security configurations
Performance Benchmarks
Metric Traditional Tools SubSpectre Subdomains/hour 800 4,200 False positives 28% 4% Report generation Manual Auto
Ethical Guidelines
β οΈ LEGAL DISCLAIMER:
- Authorized testing ONLY
- Obtain explicit permission
- Respect robots.txt
- Limit request ratesContribute: GitHub: [https://github.com/NazaninNazari/SubSpectre.git]
Conclusion
SubSpectre redefines subdomain reconnaissance by combining: 1. Military-Grade Discovery: Comprehensive DNS enumeration 2. Security Intelligence: Built-in pentester's guidance 3. Professional Workflow: Enterprise-ready reporting
You can't protect what you can't see β this tool reveals your blind spots.
Try It Out & Share Feedback!
"Good reconnaissance is the foundation of all security work β automated tools should enhance, not replace, human analysis."
About the Author
N0aziXss is an experienced security researcher specializing in web application security and bug bounty hunting, with multiple validated discoveries across various platforms.