You can use Burp Intruder to discover additional, hidden hosts that are in scope but aren't explicitly linked from the initial set of domains you're testing. This technique involves sending requests to the same IP address while modifying the Host header to look for different back-end systems. It enables you to discover additional access points and attack surface, including:
You can follow along with the process below using portswigger-labs.net, our deliberately vulnerable sandbox domain. To enumerate additional supported hostnames:
http://portswigger-labs.net.
Host header value, add a placeholder subdomain. For example, x.portswigger-labs.net.
Highlight the placeholder subdomain and click Add ยง to mark it as a payload position.
Uncheck Update Host header to match target.
Click the column headers to sort the responses. Identify any inconsistent items. For example, the response for http://staff.portswigger-labs.net has a different length from the other responses.
http://staff.portswigger-labs.net renders a login form.