Active Mode

Perform brute-force attacks to obtain alive subdomains. There are 2 types of brute force. Here there is a risk of getting detected on the target server:

  • Pure Bruteforce: Check subdomains from a.domain.com to zzz.domain.com (26 + 26^2 + 26^3 = 18278 subdomains) this bruteforce can be disabled with -nb, –no-bruteforce
  • Wordlist based: Use a custom wordlist provided by the user using the flag -w, –wordlist. If no wordlists are specified, this mode won’t be executed.

Note: Make Sure You have Python Installed on your System, as this is a python-based tool. Click to check the Installation process: Python Installation Steps on Linux

Dome – Python Script To Obtain Subdomains And Search For Open Ports

Dome is an automated cyber-security tool developed in the Python language that is used in the process of subdomain enumerations. This subdomain can be tested for getting the bugs out of it. The Dome tool has an active and passive mode for the enumeration process. Dome tool is available on the GitHub platform for free and is open source to use. This tool is highly recommended for security researchers and bug bounty hunters.

Similar Reads

Passive Mode:

This is the safe mode that is undetectable by the target domain. In this mode, no active connection will be done between the target domain and the attacker’s machine....

Active Mode:

Perform brute-force attacks to obtain alive subdomains. There are 2 types of brute force. Here there is a risk of getting detected on the target server:...

Installation of Dome Tool on Kali Linux OS

Step 1: In this step, we will be getting the Dome tool repository from Github....

Working with Dome Tool on Kali Linux OS

Example 1: Perform active and passive scan, show the IP address of each subdomain and make a port scan using top-web-ports. Data will also be written in /the results folder...

Contact Us