Skip to main content

subjack

The subjack tool is designed to identify subdomain takeover vulnerabilities within automated security workflows. By scanning a list of subdomains, it assesses the potential for unauthorized control by malicious actors, supporting organizations in proactive security measures.

Ideal Use Cases & Fit

Subjack is particularly effective in early reconnaissance phases, where it can analyze a large set of subdomains to uncover vulnerabilities before any attacks can occur. It excels when working with lists of subdomains in environments such as web application security assessments or penetration testing scenarios. This tool is less suited for internal network assessments or environments with no involvement of external-facing subdomains.

Value in Workflows

By integrating subjack into security workflows, teams can systematically address potential subdomain vulnerabilities, providing a critical layer of security assessment. Its automated processes enhance efficiency by allowing security professionals to focus on interpreting results rather than manual checks. Subjack can be positioned early in workflows, forming a foundation for subsequent risk assessments and remediation efforts.

Input Data

Subjack requires input in the form of a newline-separated list of subdomains. Each input must be provided via a designated file, ensuring that all entries are properly formatted. An example input might look like this:

subdomain1.example.com
subdomain2.example.com

Configuration

  • timeout: Controls the duration (in seconds) to wait before terminating a connection attempt; defaults to 10 seconds.
  • ssl: Determines whether to enforce HTTPS requests; by default, this is set to true.
  • all: When enabled, this parameter skips the CNAME check and sends requests to every URL; defaults to false.
  • manual: Indicates the presence of a dead record, but notes a valid CNAME entry; defaults to false.