Sponsored
Bugbounty Tools

Knock – Insane Subdomain Enumeration Tool

Hey Folks, in this tutorial we are going to configure another subdomain fuzzer in our Kali Linux operating system to make our penetration testing more vigorous. Knockpy is a python3 tool designed to enumerate subdomains on a target domain through dictionary attack. We are constantly writing articles on subdomain takeover tool, so if you don’t like this tool then you can read our previous article once.

Let’s take a look at this tool 🙂 !!

Installation

Have you ever installed python dependencies and if not then please check our previous article before going directly to the installation of this tool because we will need python dependencies for this tool to run. So first we will download this tool from github and enter the directory.

git clone https://github.com/guelfoweb/knock.git
cd knock

GOOD 🙂 !! Now go to the last part of installation of this tool and install all required dependencies by executing “python” command.

python3 setup.py install

Done 🙂 !! After that we have to go to another directory of this tool and then we can operate this tool easily.

cd knockpy
python3 knockpy.py -h

Full Scan

We take an random domain and perform full scan over it. But actually it takes longer time than the other but gives us good results.

python3 knockpy.py logpac.com

Fast Scan

This functionality of this tool does not follow http request so we got faster results than in normal mode.

python3 knockpy.py logpac.com --no-http

Ignore Response Code

The most common features which comes in each tool is that we can exclude response from output accordingly by giving specific http code.

python3 knockpy.py logpac.com -w /usr/share/wordlists/dirb/common.txt --no-http-code 404 500 530

Hmm 🙂 !! Apart from this, there are some more features in this tool which you can try easily without any problem. But overall it takes the help of word list and tries to identify the hidden subdomains of the organization.

About the Author
Shubham Goyal Certified Ethical Hacker, information security analyst, penetration tester and researcher. Can be Contact on Linkedin.
Sponsored

View Comments

Recent Posts

Gau (GetAllUrls) – Find Known and Hidden URL

The gau (Get All URLs) tool is a versatile open-source utility that collects URLs from…

3 months ago

Jsluicepp – Burp Extension for JS Secrets – BugBountyTip

Jsluice++ is a Burp Suite extension designed for passive and active scanning of JavaScript traffic…

8 months ago

Bypassing Firewalls (WAF) with XSS Payloads

Hey Folks :) !! In this tutorial, we will describe some of the techniques commonly…

8 months ago

Termux Cheat Sheet for Hackers

Hey Folks :) !! In this article, we present the "Termux Cheat Sheet for Hackers"…

1 year ago

Cracking the X-Factor in Cybersecurity: How Humans are Protecting the Systems?

Amid the rapid advancement of technology, the significance of human involvement in cybersecurity frequently goes…

2 years ago

Cariddi – Hidden Endpoint Finder for Bug Hunting

Hey Folks, we are back today after such a long break, but don't worry we…

3 years ago
Sponsored

This website uses cookies.