Kali Linux:An Ethical Hacker's Cookbook
上QQ阅读APP看书,第一时间看更新

Getting a list of subdomains

We don't always we have a situation where a client has defined a full detailed scope of what needs to be pentested. So we will use the following mentioned recipes to gather as much information as we can to perform a pentest.