Reconnaissance
Subdomain Enumeration
Tools
https://github.com/h0tak88r/AutoSubRecon
https://github.com/h0tak88r/submonit88r
https://github.com/bing0o/SubEnum
https://github.com/shmilylty/OneForAll
Write ups
https://h0tak88r.medium.com/mastering-subdomain-enumeration-6c84571b07b
https://h0tak88r.github.io/posts/Deep-Subdomains-Enumeration/
API Recon
Check for documentation
Swagger ->
/openapi.json
GraphQL -> https://graphql.org/learn/introspection/ -> https://github.com/prisma-labs/get-graphql-schema
manual ->
site:target.tld intitle:api | developer
Search for APIs
site:target.tld inurl:api
intitle:"index of" "api.yaml" site:target.tld
intitle:"index of" intext:"apikey.txt" site:target.tld
allintext:"API_SECRET*" ext:env | ext:yml site:target.tld
Enumerate endpoints / methods
https://wordlists-cdn.assetnote.io/data/automated/httparchive_apiroutes_2023_08_28.txt
swagger -> https://github.com/danielmiessler/SecLists/blob/master/Discovery/Web-Content/swagger.txt
Tools -> ffuf -> kiterunner
One-liners & Quick Wins
Fingerprinting
Port Scanning https://github.com/nullt3r/jfscan
Waf Detect
uncover >> discover exposed hosts on the internet. It is built with automation in mind, so you can query it and utilize the results with your current pipeline tools.
JS Files
Tools
Use This Extension to analyse JS Files FindSomething - Chrome Web Store (google.com)
Bypass WAF and Find Origin IPs
Using hakoriginfinder
References:
Discover your target's ASN and check https://bgp.he.net/AS33848#_prefixesβ¦
Make a note of the target's IP range.
Assuming you have a WAF-protected domain called example[.]com. Use this command with the IP range Identified in step 1 and pass your target host against the -h parameter:
If you receive a "MATCH" output, there's a strong likelihood that you've successfully identified the Origin IP. Now, you can send requests with the same Host header to bypass WAF
Using Netlas/Shodan
Make filters like
http.title:"My_target_title"
Sometyimes There is Origin IPs exposed
Last updated