Subwiz is the first AI tool in the world that mainly detects dated and forgotten subdomains. These subdomains are often the target of hackers and subwiz must ensure that companies are less quickly hacked.

Cyber ​​security company Hadrian launches AI-tool Subwiz: the first customized AI tool in the world for sub-deric detection. Previously, sub-domain detection was highly dependent on brutal-force techniques, with which many adjustments have to be generated to guess potential subdomains. This required many DNS querys without a guarantee of success. Subwiz changes this by using machine learning, making predictions more accurate and fewer DNS querys are needed. In short: Subwiz ensures that companies are less quickly hacked through digital back doors that they might not even know.

Forgotten webpage as a target
Hackers regularly look for the weakest points in the security of organizations. They often focus on the blind spots, for example forgotten subdomains. Main domains – for example Hadrian.io – can have several subdomains, such as old -international.hadrian.io. These are sometimes poorly maintained or even forgotten, making them important targets for hackers. “These types of subdomains often run on outdated software, making these easier to hack. Hackers are actively looking for these kinds of weak spots, knowing that this is an easy way to enter the network of an organization,” said Olivier Beg, Chief Hacking Officer at Hadrian.
The more subdomains you have traced as a security expert or ethical hacker, the more difficult it becomes to find the last, hidden subdomains. Subwiz makes this easier, making these experts closer and closer ‘full visibility’ of subdomains. “Unseen subdomains are a usual blind spot for organizations, which makes them vulnerable to cyber threats. By improving sub -dome detection, we reduce the risk that these invisible vulnerabilities will be misused,” says Beg.

Protection of digital resources
With cyber threats that are constantly evolving, SubWIZ organizations helps to use a proactive approach to secure their online assets. “By discovering subdomains that would otherwise remain hidden, we give companies the opportunity to remedy weaknesses before they become access points for attackers,” concludes Beg.

Less effort, 10% more detected subdomains
Many ethical hackers and security experts use sub-domein detection techniques based on trial-and-error (brutal force), which is quite time-consuming. “Even extensive word lists and permutation generators often miss many subdomains because of the lack of context,” says Beg. “During benchmarking with Subwiz we were able to find 10.4% more existing subdomains compared to traditional detection methods.
Of many of these subdomains, it was not intended that they became publicly accessible. The fact that this happened is in many cases a result of misfigurations, legacy systems or over the head test environments. These exposed subdomains are primarily a risk because they probably run on outdated software or contain vulnerable technologies. This makes them ideal targets for abuse.

Easy to integrate
Users of Subwiz can adjust different parameters within the tool during their search for subdomains, depending on their needs. “By refining your search, you can achieve maximum results. All subdomains in a certain area on the web can be discovered,” adds Beg. In addition, Subwiz is easy to integrate with other sub-dome denture tools that already use ethical hackers and security experts. Subwiz can be used for example with Sanicdns, the first open-source tool from Hadrian. Sanicdns is designed for fast scans, while subwiz focuses on discovering subdomains that need to be scanned.

Balance between computer power, time and quality
Subwiz was built using a lightweight LLM that can easily run on a laptop and generates hundreds of results in a few seconds. BEG ALL: “When building subwiz we wanted to find the right balance between exhausting detection and efficiency. Instead of testing blind millions of possibilities, we focused on intelligent predictions. Here we discovered that performing approximately 10,000 targeted sub -domees per domain, about 10% is not more likely to be found. Vulnerable subdomains and those domains are often abused by hackers, “concludes.