Subfinder Tutorial for Beginners: Passive Subdomain Enumeration Like a Pro
bugbounty #subfinder #cybersecurity In this **Subfinder tutorial for beginners**, you'll learn **passive subdomain discovery** like a pro. Whether you're into **bug bounty recon** or just getting started, this **Subfinder full guide** covers everything from installation to advanced flags. By the end of this video, you'll master **subdomain enumeration** using one of the most powerful **dns recon tools** from **project discovery subfinder**. --- ## ๐ What You'll Learn: โ What is passive subdomain discovery and why it matters โ Subfinder active vs passive mode โ key differences explained โ How to find subdomains passively without touching the target โ Subfinder flags explained โ all 19 essential flags โ Subfinder recursive enumeration for deep subdomain discovery โ Subdomain discovery for beginners โ step by step โ Subfinder vs Amass โ which one should you use? โ Subfinder API key setup for premium sources โ Real-world bug bounty tools 2026 workflow --- ## ๐ ๏ธ Commands Used in This Video: ```bash # Basic passive scan subfinder -d example.com # Save output to file subfinder -d example.com -o subdomains.txt # Multiple domains at once subfinder -dL targets.txt -o all_subs.txt # Use specific sources only subfinder -d example.com -s crtsh,github,shodan # Exclude problematic sources subfinder -d example.com -es zoomeyeapi,alienvault # Active DNS resolution mode subfinder -d example.com -active -r 8.8.8.8,1.1.1.1 # JSON output with source collection subfinder -d example.com -oJ -cs -o output.json # Recursive enumeration subfinder -d example.com -recursive # Custom resolvers subfinder -d example.com -active -rL resolvers.txt # Filter results subfinder -d example.com -match api.,admin. -filter test. # Rate limiting subfinder -d example.com -rls github=30/m,shodan=1/s # Production-ready command subfinder -d target.com -s crtsh,github,securitytrails -active -rL dns.txt -oJ -cs -filter test. -o final_output.json In this complete walkthrough, I explain ALL 19 essential Subfinder flags โ from passive enumeration to active DNS resolution, source control, rate limiting, JSON output, recursive mode, and real-world workflows. ๐ **Timestamps:** 0:00 โ What is Subfinder? 1:20 โ Passive vs Active (Why It Matters) 3:45 โ Basic Syntax & First Command 5:30 โ Multiple Domains (Batch Mode) 7:10 โ Controlling Sources (-sources) 8:50 โ Excluding Sources (-exclude-sources) 10:15 โ Rate Limiting (-rls) 12:00 โ Active Mode & DNS Resolution (-active) 14:20 โ JSON Output (-oJ) & Collecting Sources (-cs) 16:00 โ Custom Resolvers (-rL) 17:30 โ Filtering Results (-match / -filter) 19:00 โ Recursive Enumeration (-recursive) 20:15 โ Provider Config (API Keys) 22:00 โ Stats & Debugging (-stats / -v) 23:30 โ Timeout & Max-Time Control 25:00 โ Real-World Production Command ๐ **Useful Links:** - Subfinder GitHub: https://github.com/projectdiscovery/subfinder ๐ฌ Questions? Drop a comment below. I reply to every single one. Which subdomain discovery tool do you prefer โ Subfinder or Amass? ๐ Subscribe for More: More bug bounty recon tutorials, dns recon tool deep dives, and bug bounty tools 2026 updates coming every week. ๐ **Subscribe for more bug bounty & recon deep dives.** #subfinder #bugbounty #subdomainenumeration #recon #cybersecurity #bugbounty #subfinder #cybersecurity #recon #ethicalhacking #infosec #subdomainenumeration #pentesting #projectdiscovery #dnsrecon
Download
0 formatsNo download links available.