1. Engebretson
P. (2013). The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy (2nd ed.). Syngress. In Chapter 2
"Reconnaissance
" the author details DNS interrogation techniques
including subdomain brute-forcing using a wordlist
which is the exact method described in the correct answer. (pp. 38-40).
2. Ric Messier. (2021). Ghidra Software Reverse Engineering for Beginners. Packt. Chapter 10
"Information Gathering
" discusses active reconnaissance techniques
including DNS enumeration. The text describes using tools and scripts with wordlists to find subdomains
stating
"You can also attempt to brute-force subdomains using a wordlist... This is a very common technique for finding hidden servers." This validates the methodology in option D.
3. Al-Fedaghi
S. (2021). Conceptualizing Penetration Testing. Journal of Computer Science
17(6)
512-529. https://doi.org/10.3844/jcssp.2021.512.529. This paper outlines the phases of penetration testing
where the information gathering phase (Section 3.1) includes "DNS queries" and "sub-domain scanning" as key activities
aligning with the technique in option D.