An attacker once in control of a subdomain can implant malware in enterprise’s networks or systems to further escalating the attack or attackers can even send the phishing emails from the legitimate domain.
Using the techniques of Locate Sub-domains tool, this tool recognizes all the subdomains for the primary domain which you’re targeting while doing the penetration testing.
Subdomain Acquisition tool search for subdomain using different methods to find host related information, these methods include
- Public search engine
- DNS zone transfer
- DNS enumeration