In Bug Bounty, your success is directly proportional to your enumeration. If you find an asset that no one else has seen, you've already won half the battle. One of the most effective ways to look at your toolkit is through the lens of Active vs. Passive symmetry. For every tool that "knocks on the door," there is a service that has already peeked through the window.
1. Subdomain Discovery: The Foundation
Subdomain enumeration is about mapping the attack surface.
- Active (The "Loud" Way): Tools like
amass(in active mode) orsubfindercombined withhttpxperform DNS brute-forcing and HTTP probing. They are accurate and find "now" data, but they can trigger rate-limits or WAF alerts. - Passive (The "Silent" Way): Services like crt.sh (parsing Certificate Transparency logs), DNSDumpster, and Chaos allow you to see what has been indexed over time without sending a single request to the target.
Pro Tip: Passive recon often finds "ghost" subdomains — assets that were taken down but still have DNS records or old certificates. These are goldmines for Subdomain Takeover vulnerabilities.
2. Port Scanning: Mapping the Entry Points
Once you have the domains, you need to know what services are running.
- Active:
nmap,naabu, andrustscan. These tools send packets directly to the target's IP to check for open ports.rustscanis particularly popular for speed, whilenmapis the king of service fingerprinting. - Passive: Shodan.io or Censys. These are essentially "Google for devices." They have already scanned the entire internet and cached the results. You can query Shodan for
hostname:target.comand see open ports without ever running a scan yourself.
Pro Tip: Use Shodan's "favicon hash" search. If a company uses a unique icon for their internal dashboard, searching for that hash on Shodan can reveal hidden dev servers that aren't even linked to their main domain.
3. Directory & File Discovery: Finding the "Hidden"
This is where you find the actual vulnerabilities (admin panels, config files, backups).
- Active:
FFUF,dirsearch, andferoxbuster. These tools hammer the server with thousands of requests to find files like.env,config.php, or/admin. - Passive: Google Dorks: Use
site:target.com filetype:logorintitle:"index of". Waybackurls / Gau: Instead of guessing what files exist, ask the Wayback Machine (viagau) what files used to exist. Often, old endpoints are still active but forgotten by the developers.
The Comparison Table
| Feature | Active Approach | Passive Approach | When to use? |
| Stealth | Low (Visible in logs) | High (Invisible to target) | Passive for initial wide-scope; Active for narrow deep-dive |
| Freshness | 100% Real-time | Varies (Can be outdated) | Active when you need to confirm a live service |
| Speed | Depends on bandwidth | Instant (API queries) | Passive for rapid asset mapping |Conclusion: Which is better?
Every active tool has a passive counterpart. However, the "Pro" approach isn't choosing one over the other — it's Chaining.
- Passive to gather the "Historical" footprint.
- Active to verify the "Current" state.
By starting passively, you avoid burning your IP address and save your aggressive scans for the assets that actually look vulnerable.