Subdomain Enumeration
Every audit begins by enumerating the target’s subdomains. WithGiga uses passive OSINT only — no DNS brute-force, no traffic to the target during enumeration. This keeps the engagement quiet and minimizes false positives.The seven sources
GigaOps queries all of these in parallel and merges results:| Source | Type | Coverage |
|---|---|---|
| crt.sh | Certificate Transparency | Subdomains observed in issued TLS certificates |
| HackerTarget | DNS aggregation | Multi-source DNS dataset |
| AlienVault OTX | Threat intelligence | Subdomains observed in security telemetry |
| Anubis | DNS history database | Historical and current DNS records |
| URLScan.io | URL scanning archive | Subdomains observed across scanned URLs |
| Wayback Machine | Web archive | Subdomains referenced in archived pages |
| RapidDNS | DNS query aggregator | Cross-source DNS dataset |
Validation
Raw OSINT results contain noise — expired DNS, typos, decommissioned subdomains. GigaOps validates every candidate:- DNS resolution — does the subdomain still resolve?
- Liveness — is anything answering on common ports (80, 443, plus discovered ones)?
- HTTP response — does the live host respond meaningfully (not 404 from a default page)?
- Stack fingerprinting — what is it (so later phases can target appropriately)?
Targeting the right scope
By default, enumeration is scoped to the workspace’s primary domain and any explicit subdomains you pass intargets.
What you’ll see in the report
The audit report includes an Attack Surface section listing every subdomain discovered, marked as in-scope or out-of-scope, with the source that surfaced each one. This serves as both:- Evidence of enumeration coverage
- A starting point for the next engagement
Targets that don’t show up
Passive OSINT will miss:- Internal-only subdomains that never appear in CT logs or public scans
- Subdomains created very recently (under a few hours old)
- Subdomains intentionally excluded from public DNS
targets.