Subdomain Enumeration
Subdomain Enumeration for Bug Bounty — 4 Kali Tools, One Chain The first thing any bug bounty hunter or pentester does on a new target is the same: figure out the full attack surface. A program in scope says "*.target.com" — your job is to find every subdomain that resolves to something interesting. The bigger your map, the more chances you have of finding the host nobody else thought to test. This post walks the four-tool chain I run on every engagement, end to end, with real output against `hackerone.com` (an authorized recon target under their own bug bounty program). > Prefer video? The Chain at a Glance | ` subfinder ` | Fast passive enum from many public sources | Subs → file | | ` assetfinder ` | Different source mix, catches hosts subfinder misses | Subs → file | | ` amass ` | Deepest passive coverage (especially with API keys configured) | Subs → file | | ` sort -u ` | Merge + dedupe the three lists | File → master list | | ` httpx-toolkit ` | Probe each host live...