InfoSec Write-ups

A collection of write-ups from the best hackers in the world on topics ranging from bug bounties…

Follow publication

Member-only story

Finding Hidden Subdomains with OSINT Tools

Karthikeyan Nagaraj
InfoSec Write-ups
Published in
4 min readJan 10, 2025

Subdomain enumeration is a critical step in the reconnaissance phase of cybersecurity assessments, penetration testing, and bug bounty hunting. Hidden subdomains often house staging environments, APIs, or forgotten applications that may harbor vulnerabilities. Open-Source Intelligence (OSINT) tools like Sublist3r, Amass, and Assetfinder make discovering these subdomains efficient and practical.

In this guide, we’ll explore how to use these tools to find hidden subdomains and uncover potential attack surfaces.

1. Why Subdomain Enumeration Matters

Subdomains often reveal:

  • Staging Environments: Test or development environments with weaker security.
  • APIs: Endpoints exposing sensitive data.
  • Forgotten Applications: Legacy systems that are no longer actively maintained.
  • Third-Party Services: Services hosted by external providers.

For example, discovering a subdomain like staging.example.com could lead to uncovering unprotected credentials or administrative interfaces.

Create an account to read the full story.

The author made this story available to Medium members only.
If you’re new to Medium, create a new account to read this story on us.

Or, continue in mobile web

Already have an account? Sign in

Published in InfoSec Write-ups

A collection of write-ups from the best hackers in the world on topics ranging from bug bounties and CTFs to vulnhub machines, hardware challenges and real life encounters. Subscribe to our weekly newsletter for the coolest infosec updates: https://weekly.infosecwriteups.com/

Written by Karthikeyan Nagaraj

Entrepreneur | Writer | Cyber Security Consultant | AI Researcher TopMate - https://topmate.io/cyberw1ng

Write a response

Hi, its possible a free articule about this :)

Interesting.