Whole New Methodology
… I sort of feel that this enumerating subdomains / scanning CIDRs / looking at the ASNs whatever is a pretty typical workflow at the recon stage for red team or bounty hunters. A lot of people have automated and pipelined this process because doing so is obvious.
I guess I’m not really getting the “whole new methodology” part of this.
Thanks to the Courtesy of :