uncover >> discover exposed hosts on the internet. It is built with automation in mind, so you can query it and utilize the results with your current pipeline tools.
# Collect JS Fileskatana-listtargets.txt-jc|grepβ\\.js$β|uniq|sort-u|teeJS.txt# or use gau toolcattargets.txt|gau|grepβ\\.js$β|uniq|sort-u|teeJS2.txt# Analyzing JS filesnuclei-lJS.txt-t~/nuclei-templates/exposures/-ojs_exposures_results.txtnuclei-lJS2.txt-t~/nuclei-templates/exposures/-ojs_exposures_results.txtcatJs_urls.txt|Mantra# Download all JS files file="JS.txt"while IFS=read-rlinkdowget"$link"done<"$file"file="JS2.txt"while IFS=read-rlinkdowget"$link"done<"$file"# Use This Regex to search for sensitive info grep-r-E"aws_access_key|aws_secret_key|api key|passwd|pwd|heroku|slack|firebase|swagger|aws_secret_key|aws key|password|ftp password|jdbc|db|sql|secret jet|config|admin|pwd|json|gcp|htaccess|.env|ssh key|.git|access key|secret token|oauth_token|oauth_token_secret|smtp|GTM-"*.js
Assuming you have a WAF-protected domain called example[.]com. Use this command with the IP range Identified in step 1 and pass your target host against the -h parameter:
prips93.184.216.0/24|hakoriginfinder-hexample.com
If you receive a "MATCH" output, there's a strong likelihood that you've successfully identified the Origin IP. Now, you can send requests with the same Host header to bypass WAF