Back to Browse

Subfinder Tutorial for Beginners: Passive Subdomain Enumeration Like a Pro

69 views
Apr 22, 2026
25:11

bugbounty #subfinder #cybersecurity In this **Subfinder tutorial for beginners**, you'll learn **passive subdomain discovery** like a pro. Whether you're into **bug bounty recon** or just getting started, this **Subfinder full guide** covers everything from installation to advanced flags. By the end of this video, you'll master **subdomain enumeration** using one of the most powerful **dns recon tools** from **project discovery subfinder**. --- ## ๐Ÿ” What You'll Learn: โœ… What is passive subdomain discovery and why it matters โœ… Subfinder active vs passive mode โ€“ key differences explained โœ… How to find subdomains passively without touching the target โœ… Subfinder flags explained โ€“ all 19 essential flags โœ… Subfinder recursive enumeration for deep subdomain discovery โœ… Subdomain discovery for beginners โ€“ step by step โœ… Subfinder vs Amass โ€“ which one should you use? โœ… Subfinder API key setup for premium sources โœ… Real-world bug bounty tools 2026 workflow --- ## ๐Ÿ› ๏ธ Commands Used in This Video: ```bash # Basic passive scan subfinder -d example.com # Save output to file subfinder -d example.com -o subdomains.txt # Multiple domains at once subfinder -dL targets.txt -o all_subs.txt # Use specific sources only subfinder -d example.com -s crtsh,github,shodan # Exclude problematic sources subfinder -d example.com -es zoomeyeapi,alienvault # Active DNS resolution mode subfinder -d example.com -active -r 8.8.8.8,1.1.1.1 # JSON output with source collection subfinder -d example.com -oJ -cs -o output.json # Recursive enumeration subfinder -d example.com -recursive # Custom resolvers subfinder -d example.com -active -rL resolvers.txt # Filter results subfinder -d example.com -match api.,admin. -filter test. # Rate limiting subfinder -d example.com -rls github=30/m,shodan=1/s # Production-ready command subfinder -d target.com -s crtsh,github,securitytrails -active -rL dns.txt -oJ -cs -filter test. -o final_output.json In this complete walkthrough, I explain ALL 19 essential Subfinder flags โ€“ from passive enumeration to active DNS resolution, source control, rate limiting, JSON output, recursive mode, and real-world workflows. ๐Ÿ“Œ **Timestamps:** 0:00 โ€“ What is Subfinder? 1:20 โ€“ Passive vs Active (Why It Matters) 3:45 โ€“ Basic Syntax & First Command 5:30 โ€“ Multiple Domains (Batch Mode) 7:10 โ€“ Controlling Sources (-sources) 8:50 โ€“ Excluding Sources (-exclude-sources) 10:15 โ€“ Rate Limiting (-rls) 12:00 โ€“ Active Mode & DNS Resolution (-active) 14:20 โ€“ JSON Output (-oJ) & Collecting Sources (-cs) 16:00 โ€“ Custom Resolvers (-rL) 17:30 โ€“ Filtering Results (-match / -filter) 19:00 โ€“ Recursive Enumeration (-recursive) 20:15 โ€“ Provider Config (API Keys) 22:00 โ€“ Stats & Debugging (-stats / -v) 23:30 โ€“ Timeout & Max-Time Control 25:00 โ€“ Real-World Production Command ๐Ÿ“‚ **Useful Links:** - Subfinder GitHub: https://github.com/projectdiscovery/subfinder ๐Ÿ’ฌ Questions? Drop a comment below. I reply to every single one. Which subdomain discovery tool do you prefer โ€“ Subfinder or Amass? ๐Ÿ”” Subscribe for More: More bug bounty recon tutorials, dns recon tool deep dives, and bug bounty tools 2026 updates coming every week. ๐Ÿ”” **Subscribe for more bug bounty & recon deep dives.** #subfinder #bugbounty #subdomainenumeration #recon #cybersecurity #bugbounty #subfinder #cybersecurity #recon #ethicalhacking #infosec #subdomainenumeration #pentesting #projectdiscovery #dnsrecon

Download

0 formats

No download links available.

Subfinder Tutorial for Beginners: Passive Subdomain Enumeration Like a Pro | NatokHD