In so many penetration tests or assessments, the client gives you a set of subnets and says "go for it". This all seems reasonable, until you realize that if you have a website, there might be dozens or hundreds of websites hosted there, each only accessible by their DNS name.

Using Passive DNS sources for Reconnaissance and Enumeration, (Fri, Apr 29th)
This post was originally published on this site