[Network Security | Penetration Tools/Information Collection/Domain Name Explosion] Detailed analysis of the installation and use of Layer subdomain excavator

Article directory

Install

download link:

https://github.com/euphrat1ca/LayerDomainFinder

After installation, unzip it and open layer.exe to use:

Insert image description here

use

The main page is as follows:

Insert image description here

The explanation is as follows:

  • Threads: The increase in the number of threads will improve the efficiency of scanning to a certain extent.

  • Enumeration, interface: You can choose enumeration or interface functions

  • Scan port: You can select the port scanning function, and Layer will echo the subdomain name that opens the port.

Insert image description here

In the updated version, you can also customize the domain name level:

2 means the output format is xx.example.com,

3 means the output format is xx.xx.example.com

After configuring the options, click Start to start subdomain mining. Layer relies on the subdomain name dictionary, and its power depends on the power of the dictionary.

The dictionary is in the same directory as the exe file:

Insert image description here
We can collect keywords independently and add them to the dictionary manually:

Insert image description here
Examples are as follows:

Insert image description here

Note that the format entered in the domain name field should be: example.com, not https://example.com, because the dictionary will be automatically spliced ​​at the front.

After manually setting the port, the scan results are all subdomain names of open ports:

Insert image description here
After the scan is completed, you can right-click the mouse to select an operation:

Insert image description here
We can save the scan results to the specified directory in txt, xsl, etc.:

Insert image description here
Save as xsl:

Insert image description here

Guess you like

Origin blog.csdn.net/2301_77485708/article/details/135395718